0x0, 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='loginuid\x00') pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r1, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r2}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) r3 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r4}}]}) getresuid(&(0x7f00000029c0), &(0x7f0000002a00)=0x0, &(0x7f0000002a40)) write$P9_RSTATu(r0, &(0x7f0000002a80)={0x51, 0x7d, 0x1, {{0x0, 0x34, 0x8, 0x1, {0x10, 0x3, 0x4}, 0x1000000, 0x9, 0xfffffb80, 0xfff, 0x0, '', 0x1, '$'}, 0x8, 'security', r2, r4, r5}}, 0x51) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r6 = dup(0xffffffffffffffff) getsockname$packet(r6, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002940)=ANY=[@ANYBLOB="2000000010000108004000"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000efd1651ca9762950419217462bfe43adcbac89c17c28525bae1a5b3d9227d7ef210a35cb8452d5de515daa3a"], 0x3c}, 0x1, 0x0, 0x0, 0x14}, 0x0) sendmmsg(r8, &(0x7f0000002880)=[{{&(0x7f0000000180)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000380)="ab21255fe8ece7d726e1caf55a0fbfa0216d507812bca7dc870b579493cb594bc2783af0e0078e163006f29e1a80d3cb6f182cc65aa3d4d913f4bbce84a8518a50e4d75158ac952c8b525124bb626f9a7a2b42e7b2c7b602c399ed4c716fe7ba97201427e4fa6b513522928f335ea1e81a045ce2f0a2faea5e18432cda72fb79206d1c5b88b6c1567812b75c289e19736525e22dd57fc9e6dc453384", 0x9c}], 0x1, &(0x7f0000000440)=[{0xc8, 0x111, 0x800, "2af9fe29f2216015048e9635de109c005fd810e3a3f47885f6d13fe1d9fe73ce27de051e302402f6fb855b8825752ac13ed9d2facd869fe7a815298d4ca905df2e498ad35821ef5fbe68ce116af1e5ad7edd94112aeec2a0bd700a9018e769e8665f7fc03f524a605c0defebcc2d5d94bbb72cfed8d91258e51df49d3ab2c6714f66c71c313d77684bee4da7327b3784bf3311cf6746fc2be08c6d33745ee776554bee3bb4595ec595d1a3a9b88a13bd637856a8a3fd2b"}, {0x78, 0x111, 0x1f, "a52a7ba3708e67a136d9b432fa1ed8b615184c9cb9c83c30539decc987c2d1ba0c61b9eccb5dca01e35f4b9c5ae8f96b7213773b877054360fa87d1deef348c2ce2c46200d8b778a02f8098b0ec42de0f33fcd7857dbde11d9a7e70fdc00973a0a"}], 0x140}}, {{&(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e20, @broadcast}, 0x0, 0x2, 0x3, 0x1}}, 0x80, &(0x7f0000000b80)=[{&(0x7f0000000580)="94b53257d85ac270b4abde136647d4e97f222bccc7391fc10aab4e45d1373501b101eae4cc35bd519572ee1471c31beb0ae98a59c646e47581a3a8bf88e6e20d3f0c5d4e2a387f266e8b2743fc2c7f95691bafc633fb4b55f11216718ae6d57ebdae81b87bd0995408177337f7c9104da4d03f6f1d88dda16280bddaac68a2b5945196f5b867e0a7d0159eac8185307963136b10096791a7970c6a23455d46903e230a5f2e6eb29dc1164a6905ed3eb9223a370a39d3426b696062307d664d5a47f285e3dc381b9c1a4123cec90d442a5a477dd9fc38bf2b3cb77292b32b731c0deaccc758dd6a2ad4", 0xe9}, {&(0x7f0000000240)="1b1222d96efda7a82677ce37c59a4cdeb1d0b0ffd2dfdd9ef1b0", 0x1a}, {&(0x7f0000000680)="65d6ffb77919b6ee234b6735e9", 0xd}, {&(0x7f00000006c0)="8dbbc1b75abf5ae050620ca5c6adeee9e9b16c76f53a2bfc365c720a42607f8f6e45e9e2f86202931f1218a56f4bc3a3cb2e7b18aad541cba7db6fb91c1e2da54b20386deaee1f53d92540df1b6533bc5191d7b1dd3136dbcb9d6d85a82d2d10c0437110d0db6932c2c5dca9cf4e4ef1c947da0ce9e00b00829e3e28349f646603266e14c8825c59f0819e84684f08fce2fba6d79ebb0b260fc7b318b8826f01396cf20c0319fd3cea7a38db82a02f5debc1085af809bde9af93bcbd916a16baf3f839e615aafdf29677d076e80147ed", 0xd0}, {&(0x7f00000007c0)="f36c173e7ad7ebaf26a479c413ce3b9c2e924ea94ac233b750a494bd2a0e5c1b0bf8f0be8a496ae097fa3b0a873b45ca3f85f17091cc35250e1df9d3c367c7c5c7b70c216fe553c764193d5479ea915e696d376253db76f7fb0e8300721a1880b9d51a581250202ef0b152b79c78908634b9946af7fefeb3c97c8cd3d8835f", 0x7f}, {&(0x7f0000000840)="d46e427ea6ed7affdd6fdf0a97620fe7dee237c5af6aa242f9c3a0fed5b5342bbbe652bd1b8b228d44d0f29988d0c0eef71f185ed1c877a75a0df08d47239a935eeb", 0x42}, {&(0x7f00000008c0)="b59ad0bd401a1354868dac1d79b9a7c84284b20d8b87747163bc1d50bdce7b5997c0b92403af1ac56e70fdae9d0e7fa44c249d383a2b589f79be178f0e115ea78137088f99545830b7dc3afd566284371a1ed9413ada5d37418a6d4c71e382cd6d8a920ffe1d8d3ed981585238b00f2d4618b396554cab090fd783af4bb70ea5315dce48358b35f97bf03ad41a0b3badaba5cf441125a305ad718b47a65ffa839d6ec946489bbff9ca5069d5ec38efee11dfec74601c73", 0xb7}, {&(0x7f0000000980)="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", 0xff}, {&(0x7f0000000a80)="5f36a2cf850c1af6fc9b623db6cdf0bf014ec3687551959402c527590cceef620b9a126bef65f1", 0x27}, {&(0x7f0000000ac0)="e9eee07b8fac66b68f8b34c82f0435a34a66a08ec8ef40a02593c6724d26ee602ca74a5a0e0027c1c6a697077168ad83b89846f6e2f7f52f6c8ac495ad6ee384290ffaed41a21abef5c1b790e475801b21811aacf07ed9419b1e7a91ace0faaf54c7b4c04f70210df2753574dad0f22c857561479f2cebf2b64897fca7c72ba0d0d58cb47312ffcb2e6cbd02df2cd0b7e5ab0c6295613804b5f67a62142e7187af4e0596802824bc8c90f08810bdf4a9e8", 0xb1}], 0xa, &(0x7f0000000c40)=[{0xa8, 0x113, 0x401, "27e55edcd42a110aad915a6eb517a2caa08c30181436013c675100a4fd94d15b5d157ad86f63e9e839a37042a7a471153a7d3c7610f4f5c5439aca2038bfa24947a2096d4647bd11beaa02a20ab7975f6bc2360c61392dfafe0e789ff49d14b70a63b528308e3772b2e6ad4261d874a698ca908e6927fb435746cec840c8ce7a879397b69ab9b83dec8274c773fb366744"}, {0x80, 0x114, 0x7, "a66603da2fb1da3f833e175d19e8e3947c1cc4f5424af0123814da7d5acb49da2a04f33a83eafa50f2883c4c1897002159d78cd6384b966c5756df7b566fe2fc789b9d66dfa5e919e1cb5cb85e8a6a2afa687b81a656a02f49d17a5910b38aaffc47719bffe37b9c8f25fdb69b"}, {0x80, 0x107, 0x6, "09c4050c7ae4abf6d4ceb6065ce66e0a158b77cedff16729bee984932da4e67351621c3b4ec16b02f3b9868b959697bb1f1fa6ef110f245ad00d1dedac8a52c0f2fc65321b0d305202e2024aead71fa0549fa0130d6efc857fce97cea2d6f832c2ebca0014438da9e348a59e8f"}, {0x60, 0x105, 0x80000001, "94f099d49d69e99e31c806a91e2f68e926b162dcb1f7f167d24b3a2b789dbf8710f1cca468f8a11bdfa9d2ddcf660ed1f5a9c30e4f504a17d3ffbb7284cb33f65ee29c3a3166e2f080"}, {0x1010, 0x184, 0x8000, "13d023c25a7cead64a0b6b65d94f303041f6c7c13c3c47b0cdeb847ddc82bcd3e39f0f678f456e94b3436561d7448f1b2f7e3b6cd4f271c97dc3d7c68cb36112be7ccf431a406e494205959a4599d399c4240f970defac2bd7d229f79da1442e9d4a284e1faa580636ba1cc55f80d37ed470b09cc626773cc99f8ac1b7faa5158b634fb968d6a14f74c0fd2a7d63692affeb730a324fb4e84de7feeb8aed17b3cabfd4cedbd44798e0e6a30c825393e31c407357e579861767c9310bf4dd48c248742dfdc80c78342a87155e7cad0583aecbadc94b6ee14590b6145133ce1e6aa719e1d881fbfaffc9ca9afc3726b117c1c4fd998a3a1751ec653bcd57a2b94ecbc496a95f22fb85525ea88bc91c744b6aee0fa70172da03bf2d9fe8819d44737a3208ffd617b9a17b17c5ae81cfbc40beddf002efcb92862bb365be39641bc766c6ea92c2b46dc8395fc050612a1a41b8a795b00e76f9ccd3ad2f9003c01a79ef655459698848bddf6281253e0e3d441118e7b8741c60f4a46cf1907eeefcdea8427975a2d3a15be7bf745878bd568b839578db3137b692b79d7ee7af10910d10723cd6266d9e765350dbb7721582ad4b85def475cbe557bc3bb7b12a6fff1d36dc326fbc17949447bacb140d3fc81fe1e9c9cd9ddc19e731af06e4f54a4fdb7ce08e98944b8325d339995cf7d15d6101fee5c12a539847d8b6142eedd1fb4e80aa632f6190e33680554f627eb97e6b45bc2b69f59a4d742311e6b87c95c0dd440c09ef50d44fa96aceff959145ac93c4c449dcfe928a3d6dae0d24911e09eea7a0cd706102cb754d31970b411febde41547715dfda4b79031dc2d8ea7ee32d11db6af02df84c43d73f1309df34f05b6fb7269195b03816a863df5da8fbe120e3217f76fee2b1143709cec9d50d092b5de3ae4e67149d1e1ebf85000cd9d0150852d8921b9f80f8984c38c38082aa5632200a4ac5d39975487c477859b7441ff874d4fe9ecdd11b11d9001732fdeed48ee779f89534545d33d17c820fb354538230a332a43e2c8ea72eda84475e754fc7efebc0e84933d10cd12524490e852820d6cdc09571ec782d7cc2968280b5178ff40148a8e8a74bffb260433fc67bc7e073baf4756dce78fb386f636681186fa8f1d6555e321ae0607e203263b0af53ada59ccbd8f991530808ab444a4235cab2a43958aa7853b7da89feeeadfb6db6a3d8fed737db5f9ed8aba88bf45fca4d1b21826c6207fc0c71772795a624a76b8d78b6fda94e51b32d6e12612d653b9ffed3236f419169ddc89cc7072df0d570f147767102d5ddd67edf0fe72b261b88bd9e03e709156c54a6c7dd3c849afb9abb867973d20d9078d7caa2868796fb5538df2d481bffc17588026a7f052edc9616075c1ccc378f3b1da72af440663fd8e9fb0cd4695ad1e32c26158995d96c85c103c6122e86bf8722e788973accbcd0aeffca428c7bc8a8b3e52ded06829debf4c163be603c7cef05cac66e8208e55cb0a94157d08f55ff27021c65adb65c9550378a6ba0e257ed19fadb1704c111b0519267c61f70406a0a1c3698164691b67515d39be98daed40d29eb7da82c67b373ce42f371854f82afbf642421b53c0e5a2511d341b2b166da700cb9da52b86b2fd754b58f338bbf613a92a3803653e240cc4384720d06b60f5fa8092618cf17c5695d554c4d4fe0f341b8f9660e542c63288e30e055584493b9d1bc7075f66b51e2180e240a2439dcb7284a8169b7df76b8552b2acc13f97f56cb3f8d0f5a397ac555c3316956aefaa3a836ce107c472ac18e2774e953693065ea960b3f2f9ea6cb4e8be5c7fb07046a60e14e7eecb44582fe690f5e96d982b4fd60ebf4562bd26ebaf9f2b49aafc0824dd621d75b688d53dce596fc1efd2e018764c4230523853bf772b4d4b363be3e1e252689e932871e53fc380be96ee6ccb3b918cb5e20aa765e7c8391d8ae866d6c2a4323f348272dc2b76140fd4abb1f22cba53a24e500307a6f055b9211e5fba3706a89a56511cca32cae218794c70d7fdde5b50106877924edfdc6c5e03f0e4e560594ce72f0c3409431aceb278c9bccad59305c704de695f137dc62c9bcba4e77e118e084e308dfc15c76bd51a7ee1955afbd09b5b2992897bd93a9db95475df82f627f4c81f13757980e3fd48d098bd35de99939e52da9973de03df9310da16e3006daea251f3f20997640d2d1a6f0e7784ad3249472ca1968d1d41fdcec33038ec78b6d332e8a863081f0b857ea768d3c60af44639927453f67e04a23448a1c3d31a9c7274b4d26f8735cd54b47d658f1e25a97325260df7700b49d5314bab93bb6b652e10d35bfb80080de784ddbef332980a3f268859347b740244dd884d08202cf741c8a9b1b515d49ac0cc112a7317b3af7f87893c39dee8b91b1fea59524776c761c5b150d7bab9ad20a2b8bf6826d48424132b7b219802f9be6f0bfee62953fb6955fb9d6a3e8433d3ac87429ca9984105c38bd6ff4e8351f8c3a91998b03a04a81f61e9aa5c34ab93b3e508411fe7a44b5de4783a5e7ee33154503f1e2b115fc62745e89ed9525d1b202c912e427712bcc3e2d632bbdaf1d8af9f172512f2949ddea9ef5e57cca5376a72bc012e801053289f1bbf08630ea5bff21449db8a7da06f2c19c2f92d110af0dda955c6ccf4f9375d733edf47b603fab2924d6dd979f1a30bb703e0eda36515075a5ae91e288c09c07277453b04160c523fdc68e910ef7ce4d1b9065b46e26d43d49f3872554af14fd50f005c108ea2ae639311baec1164b75cbce865c725e64b7be61829816ed7ad7989f545a203f7756ce1a75b56f6f04ea19f216cbeaba09bc6528867b3fe710cebf3236fa2938dd39deb270fe95dcff656c907c7dfc2c0b17774f8c0928c3a6e41b616aa48ac789945619df716a08f673782f910f7bcfe2f35d223e2163e3f76596654f5fe18c017aaa2ac5ab5533acff8ad9e90f560ba34fa12f5be5dbe305815b888f58609ad3a05b23913583f669e18ac92f5bbef4e6d27e2d36f28d08b08afe7d6d8b021d517c0a9c3657f56ed39671a92ec74d073093a26eaa022b12e54a2441122eb6238453036d39fe15b74b2237a9640c072cd752605d76d3f5a71f138c8370b0d8b2b1f07a7a9c4f4da0fd3af6c34dda0c4fc083d81c8cb3e113772bedcb8323b087181ef27417d47a24223a90991f32d36d1b6689f79b19a7d7f49731d1323b18c33fd93e67f7fa98ca832b201c7be207ea4b856a5aed67f70e6fc2025b1c0d2efad2a13cefbb022583d8b45fc7fb3caeb5528016c36222b29cc0a88df85e2df66b8fd055f361f5b7c29cce097fa98c9aaa002a4444aed5078df11bf4730f089b909d3cdaa4d0a566d201a0261fd248939eeb58b15a9dd6ea623dec8772b8637103f8d8b5304333540166397794a23e3e04e76361320e6224339c36c22e584b5147f9a2e4d197f4df15b0da2fa00c66a45d4f4566ec6f3f319fa90712beda4f67074d1bf0190550dae769bb431f548060e68c474de74aebe2c3773028ea3fad1ab779e55ab6b32ccd12cfe769fca5ba7401fcbecc8456a095162b4aaee44960939891182d1789a911752510279685a162ed0089cdc68d4caaacc7d31c25dd83cd32d084b68508ae7e42843b9188b88f6b93b19002be87d2f09f5b7153b3211c7c250b219b8c78d191b686da9aa3c449e8ff28f4f9dc6ea0ddc7915b004079d2c577e3deddb54344b207f25eac70f00b35a6a8158c67adf8690db61d0190c35c0f1d33417291cb07dfe0d5b61c1881333253f755faf351a7164c67fc9fc7f484ca407f928d26dd6396d0332710ab3dae57f4969ad13fb673d7e5970c63bff86c0078feaa69f822f2359b8033d1421998444ed9cc49270c93588a716738b0ab579eb16297e3843f405ab65ae8d957b18cb54a4a1b5404b8df3eb25cf3297c2b5cddf955002c05826c58e03963f413f0518c6aebf176a4eb7e503089b19398475e5314dd7b036915dbeca7e7bd966900e9d38db5a9a04238eac2f56d710714ab681684b1a3041a9201f613daeb0b73e6f48a978c941936a61fa9864db7abccdfdc0c27d9665cf0d6066a60f2b2787c2281bc10fc4e38ca1d3a5322caf4b9c97e1f050748e404476ad27b41c216e4fccd7212629d4a05d4b37da4a08862ae7b46779fc1244c485be90869b31a717b48548e2ecb6ac4d63cfbe5f187ec289b1fb3d83ff531703ea2e41d45d985be2b35078c0becd1af0407ce0c54738807a589a68a9c3d268ffc8d5a6094bfc3e9fcdbeeea5c8514c3c9f2e66373f7ec1c1731a202d4aeec2fedebf898f4ee8c8c9435e2cfb92c3fbbec9b45b40b01e84b21ce625858da86dc0b7cf4c665baecccd1e818a744e05b2b624e55f89e64d80fa8d6171ba14d73105f546e06fd92dcd76eaccf206912427e285bbb2817225d88cf54d3798d1bb0baaca2dfb794ce96754e316e42ca0db1a62ce93d81b232330ed75600f0b38d94b3d441799b7cd75d5b7d7158e9b2b7984ba28c195a72d6b315c9051949981d8439d67da645332a7b230673c42e77c7b61d28b7fcc6d0fb0f1ab2f51b190612a948791981adede4e699988b2be97fe80abdd8ec9a4d2bfcf6864fef9217a93e2d4341cf0eaeed2a29a42027bdd8de939220824e3471acfcbb63b0f15fb92adb17a2e9a7567c34a71ffdc755e0f9f76a49be6ea45fd07d8bfbef4b8da2e348b7d7a8b30e8e7a4f8c34b98e3b66a7a632a6d003170f4d50d722247c7c3fb658a6783fafa18eb0aef94db1665963cc65ec68c7151733adb8598606549908ac19bf126f84abc713095086519bc0a560e4780d275e972030e81d802a0d958fc156a788b40f42c52a299af0ca78d840d47d693635f50d2c3b90ea48647028da6f6e645b9d66358d106d4cc2be88b0f9a3e125b19d6f7d9c4fcb81e226f0e650d156502e120effbd6726c2ad8796d576d8290360e2129653d4d0b7d99f6317ab31f1c8cc0f0442be168fed12db831c61a47a47883218f44db34f768cd81f669e5d9a03dfdb7b6c579e24c76e37ab04808e85959feedfe58d470421cfba1d7b2e20ef28db876053c1a5aa024926255319adcf1967dbaf821be3eed793da4334c502e4cdc1a35d5e78a40c14c01e006b669b3c6c6a4231960502a89b1565e3095c377b521b56b30daf279c45e51b3c3769c2d9597aff0bc95fd315f19ca720fe18fe3b6b5518a3535d86ead4e95113263dd3a2b2d3eb02653b638e01aa98a08ff3e121f1799689641329ce6dc2b7113f484482b1e283f8215ea533cbd592135c2a87be91df5d3f4f35311d62f731585e281ade07f65bfc4b8170995ad185dd96c52a65beb634238b32d0ab2d135611bc005de889136f9b1e9c30ed4303dce09c65fac2fe805fb0be3981deca99924be4951625502107927733279934e1202dc71e86a02edd180760937a2ceabb68464964ae08f9e5b374fba1eda1a1889915b86bc3ebfd5da8abbe31090d187cb401010da49577ed44f192cf24a1c77770105f259076530f54ea881339a9c799ddbbc30353a1c4118afa12de2cb3973531a8de1ab17ab0012d0e9a44af5f49ab2be386a5bf30e13b582fb3a0ae5d0cf866cd53dd957a1bf1838d9015ea5ddcb211f2035b59cd8ab88eadbd11cc82547416501aec62039420672ec03567f6b91d7052b9bd0e00cbb83ef5607f1d4f9d8d05c7e7207fc266bb069dc175aa0a8a24495e1d6b43939cf3ac424fc7c2bbf492847eeb2b6ec2442779a5292f0a7d"}, {0xf0, 0x10b, 0x10001, "4d0e0503c1f08a789bb5eb6653622f0750de5aea47bb78f6a49f478a0010efaf5b346332058a1e7ff17a5576d409eaf5321131dab37c0bb5775de50a7430769df971807f9af09b1ba05ea7a7745269b04830f4ec0fff237590edaa261642ee3a77cf185b7882b758e9e3f27b7c4b72ddbcb8892efdbd5b85c28beacae28cb1b02a7d3286f324ee60a988898cf18599b6a757acc31d2bf9d134ee1902e55d23199293be857241951a4f3bd6abe9e06b9c5de5ad12686fb04db9ddc5bb7d942b308e934a5992613d6f6bb7f87955e45c9253e66af139efa12b04bbc331"}], 0x1308}}, {{&(0x7f0000001f80)=@un=@file={0x1, './file0\x00'}, 0x80, &(0x7f0000002580)=[{&(0x7f0000002000)="340c327d11557895307daba3c4c72fae1fa5c71f9b03ce62d5524116e8b761fed8ffd1db3f117e2b68fbf249e8a1b593f25dae5f7b88c178b4bbcc990fbbce05064035347ae12be091465b9bdb804f63df8a44a5089263fe74dd905da71b711fe48ad3e135d77b504a192c3c80b0b684f8c97ce5e1e46fca28cd302cea93168dd8032e494ecdf2fb0316e1c9", 0x8c}, {&(0x7f00000020c0)="ecec6130bf6d7fa9592ab796d314f08577e8288a386fe1338b4a03a726f06e4d1e007a35762b86ccf8743b8e3b58f6c5656d113947ab2ccc3c861f4ffc591ea2dc9abc73da7e7b899844479a188e686b5775bdaba3c5743df39404be44c3142ae8dab5ad130f32024477ea9fbdf4099a36de2318de4f81c282e15ec615c834abcd16ec9be03a2322fbe9a493fcbeb02a3242400cf6e0d0", 0x97}, {&(0x7f0000002180)="f2c394cfa5c561ca913dc73cbf2fcec9f600ba31092077f9ae634c", 0x1b}, {&(0x7f00000021c0)="cb02d8052ab77afe61a2faed788442a4e6d423cada8607ef11a70603e9ce389ce1ae77691c37e76191937f7ab02e43dd7e11", 0x32}, {&(0x7f0000002200)="d8359b1dd75bf98436bf3e5a11e44626d08adaa18ee9f3dea5833125018d3560ba7b120ec1f54b25f27eb0830da7c24c4b71d68feb199e2831e161b2253b9fc2c74e15f59353e3e6bf5b7ab808745e03cb46a1eb7cafff73bf7b4427b508d6a8e63d101e59e62e51963604b89602a31fda1a53353a026e5ccd43a7c4e6b9f31fed4c9eb7d95f4e64bb66dfc561a2e371f1e3229c1b3b463270e24048f523f4e064030b57b6", 0xa5}, {&(0x7f00000022c0)="3d20d134635955e1b69b76e6b0d76b3c84731ac4577d2f3200879d3fb7aeedd01a23292007b8972cbeeccc520d4a6dcf2545f6de80259d", 0x37}, {&(0x7f0000002300)="07336ed477ffcdfcd7d46480c78fa1b5b50fb66f269eec9d9a7233ef8d51d399e53a90645bb9c1ad6e457903848c478dc88e7a86ba740cf738f215dd7e56e29f8fe1e1c41e6dbfd063c26b5c2810e00adef298059a54b8567d25619d046a67bc91ba1abffad3ffac31abcc52781f737ed20ebe0f39c4cb2f26a38638a04996e2d37aefabf94e41b277483e96d1d7657e29fc7f89a69cd040902f6f2dd6b71060913b5ec43add3d00cef2c78ddfe38d3b6b9e310fd579ea", 0xb7}, {&(0x7f00000023c0)="00f0de3c68b74990ae5483f15f3d1ec66745204efe06e0a61329d2d7b2c7b9167cfe71e34a21f3eca35b7a31b1c166afc816c1f3462b6f77f464c2fd031d67a00ba7758b355823aa752529bc51e8c8d73d473a66", 0x54}, {&(0x7f0000002440)="1d1f09b5b222f0f8c179f77d8540cce8f84fc365066f5762b665f6845df699fbafcbce2b9878f07b383b79bdb5966705c13dded3da663fc33bcb1b0836d0e10031dbcf3ca2b063b738e63636af18cf1b85f89cef698c55372b9dcaba3c52c94e243a956f2816dc2b42e66ff750540f9baa69b8936f8409893787cd5f71d471836264e289", 0x84}, {&(0x7f0000002500)="d778d573f68c52788deaf2caaf991a81c39dd632792129e6f07d55fdec6bbf9fb3f42e6650a732a331fef215f695d5644067c85ff3a98209a3c53faec8436ca465d4ce3eed068b0f25398c427a690eb67f4f18201d4cfd9d572dee11b7477559854d68bc35af40e4e249d642c87d64e2e2c9", 0x72}], 0xa, &(0x7f0000002640)=[{0x110, 0x104, 0xaba4, "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"}, {0xf8, 0x10e, 0x3ff, "a3936aadb7d7bd5898021a7f26a64ac59263e74ff3ba8c09a15a8cb2235515a255f449ecb1abe039e4d0f5886faf540bcd1720b7a16323431c2a655edbd5c50d2f383566ffe1e8335a8b9bce0eab71f53379bb05f1fa9748b213363305a44dc52d965a25aa336add2c619f881327d0e7cfadb42ec72252be5d1f032192a6e3dedbf305fe93df2af8c7ba1d3cf32311952d35642500ad276d1b780aad9ca6b2b663c1dff7abbc27c345f0f417efaa2cdedb9fac78e7c8443231ef3ef6d9d2c0af1aa8a19c5ecb4d338f9400da7dfb0fb8e774f9d7ce7ccc5cc117612c68ca129ffd6e72cdfacd6d3b"}], 0x208}}], 0x3, 0x10000081) socket$netlink(0x10, 0x3, 0x0) 00:22:33 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:34 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = socket$nl_crypto(0x10, 0x3, 0x15) fallocate(r0, 0x47, 0x3, 0xfffffffffffffff8) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r1) [ 358.991118] hfsplus: gid requires an argument [ 358.995920] hfsplus: unable to parse mount options 00:22:34 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(0xffffffffffffffff) [ 359.065371] audit: type=1400 audit(1580084554.075:67): avc: denied { create } for pid=20339 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 00:22:34 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) r3 = syz_genetlink_get_family_id$SEG6(0xfffffffffffffffd) sendmsg$SEG6_CMD_DUMPHMAC(r2, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x9c, r3, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@SEG6_ATTR_SECRET={0x18, 0x4, [0x3d389817, 0x0, 0x6, 0x7, 0xeb4]}, @SEG6_ATTR_DST={0x14, 0x1, @remote}, @SEG6_ATTR_SECRET={0x14, 0x4, [0x95, 0xf8, 0x17, 0x9]}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x2}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @mcast1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}]}, 0x9c}, 0x1, 0x0, 0x0, 0x10}, 0x44000) 00:22:34 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) setgid(0x0) close(r0) 00:22:34 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f00000035c0)=[{&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000080)=""/40, 0x28}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f00000000c0)=""/253, 0xfd}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/29, 0x1d}, {&(0x7f0000000240)=""/254, 0xfe}, {&(0x7f0000003400)=""/130, 0x82}, {&(0x7f0000000340)=""/25, 0x19}, {&(0x7f00000034c0)=""/210, 0xd2}], 0xa, &(0x7f0000003680)=""/226, 0xe2}, 0x40000000) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000003780)={@empty, 0x41, r5}) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:34 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x14, r1, 0x21}, 0x14}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$NL80211_CMD_NEW_STATION(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r1, 0x8, 0x70bd25, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x2000c844}, 0x4044084) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) getsockopt$IP_VS_SO_GET_VERSION(r4, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r0) 00:22:34 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) 00:22:34 executing program 3: io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$sock_SIOCGPGRP(r1, 0x8904, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs(r2, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r3) 00:22:34 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) connect$phonet_pipe(r0, &(0x7f0000000000)={0x23, 0x18, 0x66, 0x8}, 0x10) unlink(&(0x7f0000000040)='./file0\x00') close(r1) 00:22:34 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r0, 0x0, 0x0, 0x800) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) 00:22:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="3000000010000108000000000000ef0000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000d0000000000"], 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:34 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_score\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x383}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000002c0)={r8, @in={{0x2, 0x4e22, @broadcast}}, 0x80, 0x1, 0x7ff, 0x6, 0x0, 0x3ff, 0xfc}, &(0x7f0000000140)=0x9c) r9 = accept4(r1, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) write$P9_RSTAT(r10, &(0x7f0000000080)={0x54, 0x7d, 0x2, {0x0, 0x4d, 0x6, 0x5, {0x34, 0x4, 0x6}, 0x41000000, 0x5, 0x19ec, 0x4, 0x9, 'md5sumem1', 0x1, '{', 0x0, '', 0x10, ')selfwlan0vmnet1'}}, 0x54) 00:22:34 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='keyring\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r0) 00:22:34 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x48a140, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x80800) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$SNDRV_PCM_IOCTL_DROP(r3, 0x4143, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r0) 00:22:34 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0), 0x10) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0x801, 0x70bd26, 0x0, {}, [@IFLA_GROUP={0x8, 0x1b, 0x886}, @IFLA_PHYS_SWITCH_ID={0x15, 0x24, "c0468eaff3f07f1d6e68a74e7b40df34e0"}]}, 0x40}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:35 executing program 5: ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(0xffffffffffffffff, 0xc0bc5351, &(0x7f0000000000)={0xff, 0x0, 'client0\x00', 0xffffffff80000006, "b3a3be05ca1de43c", "85ca2d2bf250d28d15e6f00f680764a49c5b69bdbfa75787d096dcd13900a408", 0xfffffff9, 0x6}) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$EVIOCGABS20(r4, 0x80184560, &(0x7f00000000c0)=""/20) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:35 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) 00:22:35 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_vs_stats_percpu\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x50000000000443) r4 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10, 0x80800) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) getsockopt$inet_sctp_SCTP_CONTEXT(r7, 0x84, 0x11, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r8, 0x4}, 0x8) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) 00:22:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) 00:22:35 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1bac9eca90821ac8, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x8000000000000000, 0x0, 0x0, &(0x7f0000ffb000/0x4000)=nil, 0x6}) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r0) 00:22:35 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 00:22:36 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) r6 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r6) r7 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r7) r8 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, r8) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r9, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/dlm-control\x00', 0x101004, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r9, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, 0x0, 0x0) getsockname$packet(r9, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r11 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r11, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$KDSKBSENT(r14, 0x4b49, &(0x7f00000004c0)={0xa7, "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"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r15 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r15, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000880)=ANY=[@ANYBLOB="3000000010000108180000000001adba68475bc9694700a32b94d5a4cf095fb5e2c4c09f6d225f882d09109486aa0bd8c5106a6ce3fed7d47862231dfe2ff33abeee25df1f0fd65615de9fb980c25c7b04f4b56c53abf9f35b51ba95fa9a9048822d81b1018a4253090000bfc6c19f09de1d030e24ec200f124ab839e6626ce23e2197a0c131dec57a762ad1e65dccb81ba5ba4b7067f02dffffff80d2fd36b0cb344798c1f84fc0253e614d1937f428155c7b87e30511ef35f946265a307d4d8da1e471c2c50a89626443bac2bf6058e801d78cba4dfc426ad44a7a1a4d0e6b195397f1ac0f8a3e412046020163fe99cb3987a25ceb687c004f19baf1d283e22fa93a91f491e828e9f26dd33fd4faa30d652eb6a4c657c4ce45fddd82ca4f000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000d64ed151000000000008001b000000000008000d0000000000"], 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:36 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept$alg(r2, 0x0, 0x0) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_SETGAMMA(r5, 0xc02064a5, &(0x7f0000000140)={0x400, 0x5, &(0x7f0000000080)=[0x3, 0x40, 0x1, 0x400, 0xffff], &(0x7f00000000c0), &(0x7f0000000100)=[0x8001, 0x4, 0x8, 0xfffc, 0x7, 0x2, 0x6]}) openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) mmap$snddsp_control(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x30, r0, 0x83000000) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$setpipe(r6, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r1) [ 361.390297] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:22:36 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r14, 0x80045400, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x7a, &(0x7f000059aff8)={r11}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r11, @ANYBLOB="32f2021d01002700"], 0xc) 00:22:36 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x54894) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r0) 00:22:36 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = syz_open_procfs(0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) accept4(r0, 0x0, 0x0, 0xc0800) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$KVM_GET_PIT2(r4, 0x8070ae9f, &(0x7f0000000000)) close(r1) 00:22:36 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) 00:22:37 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:37 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000200)=0xc) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0x0, 0x400000000}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='oom_score_adj\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r3, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r4 = add_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)="ab64fb1492c2918b97310b1d742b67373ad9c65c9503ccafa69ee7a91b52e154f05a057c35c2a8585df8ea54527dca6dc03e4447589dffc602450cd207ceb8f35494e5dfd75a7bbb7bad783c2acf1d00e891748bfa0117d272aa6579f6644adc2d95cff75aad139d843d92974cb977fdf16484c58a4a7551a81360a6dcb8d83a40a15b12ea93724637e538827bd884f54171ced1598c41e3d70c5e7e115d066cb166f5f70c2c9d8b87febbb224dbf2361b6d991b7b5570fa607d196130ae278628180ea0c36306334ce282c99b4793429706fad545c0645c0b31c7de58f473f693744c7c6e", 0xe5, 0xfffffffffffffffb) r5 = request_key(0x0, 0x0, 0x0, r4) add_key$keyring(0x0, 0x0, 0x0, 0x0, r5) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) socketpair(0x10, 0xa, 0x81, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = accept4(r7, 0x0, 0x0, 0x80800) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$SCSI_IOCTL_SYNC(r9, 0x4) close(r2) 00:22:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_REFINE_OLD(r0, 0xc1004110, &(0x7f0000000380)={0x0, [0x8, 0x5, 0x8], [{0xfffff76f, 0x2aa1, 0x1, 0x1, 0x1}, {0x355b1678, 0x4, 0x0, 0x0, 0x1, 0x1}, {0x0, 0x1, 0x1, 0x1, 0x1}, {0xaa95, 0x6, 0x1, 0x0, 0x0, 0x1}, {0x5, 0x1000, 0x0, 0x1, 0x1, 0x1}, {0x3, 0x101, 0x1}, {0x7, 0x7, 0x1, 0x1}, {0x1f, 0xc73, 0x0, 0x0, 0x1}, {0x5, 0x7, 0x1, 0x0, 0x0, 0x1}, {0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, {0xabee, 0x9, 0x0, 0x1}, {0x7, 0xffff, 0x1, 0x0, 0x1}], 0x1}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:37 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) sendmmsg$unix(r4, 0x0, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) dup(r2) write(r5, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:37 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r6 = dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r7, 0x89e3, &(0x7f0000000280)=0x1) ioctl$VIDIOC_DQBUF(r6, 0xc0585611, &(0x7f0000000400)={0x127d, 0x7, 0x4, 0x4, 0x81, {}, {0x1, 0xc, 0x3, 0x8, 0x54, 0x7, "e66e7a54"}, 0x4, 0x2, @userptr=0xff, 0x8, 0x0, r0}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380)='nl80211\x00') sendmsg$NL80211_CMD_STOP_SCHED_SCAN(r8, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000cc0)=ANY=[@ANYBLOB="2ffe0000", @ANYRES16=r9, @ANYBLOB="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"], 0x730}, 0x1, 0x0, 0x0, 0x850}, 0x4000) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) 00:22:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4002}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="000000ccf8c73a6e69f0439f12c4b0ecedbc0001", @ANYRES32=0x0, @ANYBLOB="00000000000000356c9a4b00330d0000000009000d0000000000"], 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS64(r5, 0xc0385720, &(0x7f00000000c0)={0x1}) [ 362.178079] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=51192 sclass=netlink_audit_socket pig=20535 comm=syz-executor.4 00:22:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_CROPCAP(r1, 0xc02c563a, &(0x7f0000000080)={0x3, {0x3ff, 0x4, 0xfffffff9, 0x4}, {0x3, 0x8, 0x3ff, 0xfff}, {0x81, 0x40}}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:37 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) 00:22:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x39e981, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r1, 0x28, 0x6, &(0x7f0000000080), 0x10) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:37 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write(r0, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r1}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000000c0)='./file0\x00', 0x101, 0x4, &(0x7f0000000300)=[{&(0x7f0000000100)="b90df44359e5f706702f26f62431c40f1ef0c737821cc79e7dbec968a78938e9511f7d36c06520ab81f4de50d3fa88c6fd2c44ae55c4d3d5c3154bb89de81c98d83095db1e7e2f82ee15d3f30038eb21bc449718cc8573a90ee47065e233d7d50052179c2f9686154651035e1b10f06aa39c4fa6a0a2434a6eb48b3c3f522423138b8ec6965fe2a8dd1266bd6e924955e1f38d64ad6c08795e7bb68b57526e945bc2e5d31e8905e2b1287bb5072be61b41a9c8db9187fa43352701b6df032f54680bb7eb571155fc71fc0f4f47935a0750c7bf", 0xd3, 0x8bde}, {&(0x7f0000000280)="614aa6f50af2429542c0c8da8ca1301b84c32b0ff094c60e201da4f34f300c60c21c8068d6597aa863b68787490357c6b54c673cfa0c3a0855aa6ad04f6e110c080ef4067b3109cb407b4835e5a2a3b953fe4cd3d5a761265a2a866ebecb25b882301154b9481a9299d17fae65ac4b14e24c68f57fbe", 0x76, 0x3}, {&(0x7f0000000200)="e6af33aa0e2a4c", 0x7, 0x80000000}, {&(0x7f0000000400)="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", 0x1000, 0x7}], 0x2404, &(0x7f00000014c0)=ANY=[@ANYBLOB='nospace_cache,discard,subvol=vmnet1,subvolid=0x0000000000000002,uid<', @ANYRESDEC=0x0, @ANYBLOB="2c66736e616d653d656e63727970746564002c666f776e65723e591d809b8a6fd957f7484cd6242d92ddd8dd5095cc6095fba252ad85b67c4d", @ANYRESDEC=r1, @ANYBLOB=',context=system_u,\x00']) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r2) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000000)=@v1={0x0, @aes128, 0x8, "41c0ce4627ce5e2c"}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(0xffffffffffffffff, 0xc0096616, &(0x7f0000000040)=ANY=[@ANYBLOB="010100000001000000"]) 00:22:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) syz_open_dev$char_usb(0xc, 0xb4, 0x81) 00:22:37 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) 00:22:37 executing program 0: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x7ff, 0x100) setsockopt$TIPC_GROUP_LEAVE(r0, 0x10f, 0x88) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$NFNL_MSG_CTHELPER_GET(r3, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x2c, 0x1, 0x9, 0x101, 0x0, 0x0, {0x0, 0x0, 0x4}, [@NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xdd3}}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0xffff}}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x40000) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000080)='ip_vti0\x00') getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 362.653589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pig=20569 comm=syz-executor.0 [ 362.669711] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pig=20572 comm=syz-executor.0 00:22:37 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcsa\x00', 0x4b0001, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$bt_BT_DEFER_SETUP(r4, 0x112, 0x7, &(0x7f0000000340), &(0x7f0000000500)=0x4) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'sit0\x00'}) sendmmsg(r6, &(0x7f0000000d00), 0x400004e, 0x0) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000002c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB='H\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="00012dbd7000fbdbdf250700000d14e241dd860072ef73653000000000000000000005200000000205000100010000000802054058fb1e01010500010001dd001d6ce5b6cd0d72f14b9e3a3fd4bfaa98e900"/96], 0x48}}, 0x0) ioctl$VIDIOC_DBG_S_REGISTER(r5, 0x4038564f, &(0x7f0000000240)={{0x1, @name="d29f5c04bde528e1a5679867cec11937261602c5d13d900f375646bc30e39004"}, 0x8, 0xfffffffffffffffd, 0x1}) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) sendmsg$NLBL_UNLABEL_C_LIST(r5, &(0x7f0000000300)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000480)=ANY=[@ANYBLOB="905bf9c56261940ee10e3a7f86bc89919bea5fc4e48b94353f1d109df99a8ed31e8489c0a01ae194f78d7708b97eb7b4b584723e35c63f9f5e36b351655959a8e777ae7030c8e34138939058bb56bcf9c4e14f", @ANYRES16=r7, @ANYRESDEC=r8], 0x3}, 0x1, 0x0, 0x0, 0x4008040}, 0x40015) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r9, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r10 = syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r9, &(0x7f0000000780)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000740)={&(0x7f0000000600)={0x114, r10, 0x800, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9125}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x700}]}, @TIPC_NLA_SOCK={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0xffff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x81}]}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x11c9}, @TIPC_NLA_PUBL_LOWER={0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3ff}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x800}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x7}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x84bb}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_LINK={0x68, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x748}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdb42fb6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x29cb}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffeed}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x40}, 0x4044004) sendmsg$NLBL_UNLABEL_C_ACCEPT(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r7, 0x1, 0x70bd25, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @dev={0xfe, 0x80, [], 0x17}}, @NLBL_UNLABEL_A_ACPTFLG={0x5, 0x1, 0x1}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x27, 0x7, 'system_u:object_r:dhcpd_state_t:s0\x00'}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000}, 0x4004) r11 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x9, 0x2002) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r11, 0xc008551c, &(0x7f0000000080)={0x3f, 0x4, [0x45]}) ioctl$SIOCX25SENDCALLACCPT(0xffffffffffffffff, 0x89e9) 00:22:37 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2000, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:38 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x19000, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000680)=""/102400}, &(0x7f0000000440)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) r5 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000380)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000580)=ANY=[@ANYBLOB="00000000c9533f1ca70602960aa590d3a1b4167d91c4af24ec6835aa3df89f3050606a1b330614a07854207801c9742ee4623303bd154513df2d2a4eb1600d8ec627de405791b411d0455129f80f05c3b67594beb2d5c74d18aa493d65", @ANYRES16=r5, @ANYBLOB="000825bd7000fbdbdf2506000000060003005900000005000400020000000800110001000000080011000000000005001300ff00000005000d000100000008000b000300000014002000fe8000000000000000000000000000bb06001b004e2400000c0010000900000000000000"], 0x74}, 0x1, 0x0, 0x0, 0x4040080}, 0x84) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:38 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f0000000040)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(r2, 0x407, 0x9) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000000)={'batadv_slave_0\x00', {0x2, 0x4e23, @remote}}) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r2, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r2, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000000c0)=0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:38 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r2) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000100)='id_legacy\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000200)="ede848ecdf7b0c327e508cdaabcf8e7cf7ecf69b06d3d3d07f03e488e689226acceba955f5fb8203c1d0da4ea9427c6ec01a5670528e08f0368db55cc37a2377191860e15d18c995a79576070ae0b9998a9017f1e1de4399c9cd35aeb177fc646ba3353d2a48a79fb71c8e9d4033ac0d05edefc0c94e7b9375d50060f3a76f8094aa80b557457902986d95d1a646630306645b464e", 0x95, 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r3) r4 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r4) request_key(&(0x7f0000000180)='big_key\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000300)='\\\x00', r4) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key(&(0x7f0000000400)='trusted\x00', &(0x7f0000000440)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) request_key(0x0, 0x0, 0x0, r5) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f00000001c0)=ANY=[@ANYBLOB="00e9b333a134e09c29000040", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0x3) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000380)={r5, @in6={{0xa, 0x4e22, 0x1, @loopback, 0xffff}}, 0xd607, 0x9}, &(0x7f00000000c0)=0x90) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="30000000100001080000000000000000000000002829a514ba3444cb026a9dc05b2cd27a3c45bd23022cb35a18175e89f7626b8e7be47c20d061e695521a7db1e84c0de9fb4ef89dad436e0abd9d0d85865e03f98a0aaa6469f3a0d82bd0a0cdd39852ab4c6db059cb90b2ad0a8eaf5a56525288e496bf1e404117f076c0d426b0bcb51a2edf0781d23025927fb01390097883c1964d96612e55c75662631d88ed9db7a126d4f15c7ede9e233014965bbed7eddd7fac36", @ANYRES32=0x0, @ANYBLOB="000000000000000008001b000000000008000d0000000000"], 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 363.204692] Invalid option length (64616) for dns_resolver key [ 363.214599] Invalid option length (64616) for dns_resolver key [ 363.232325] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 363.242516] Invalid option length (64616) for dns_resolver key [ 363.249373] Invalid option length (64616) for dns_resolver key [ 363.256435] Invalid option length (64616) for dns_resolver key [ 363.291180] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. 00:22:38 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000040)=0x1001, 0x4) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) close(r0) 00:22:38 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) dup(r2) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) unlink(&(0x7f00000000c0)='./file0\x00') getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001180)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000001280)=0xe8) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x5c8}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0xd}]}, 0x30}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:38 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:22:38 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$SIOCAX25NOUID(r1, 0x89e3, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x121100, 0x0) sendfile(r4, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000000)={{0xe69, 0x1}, 0x8}, 0x10) close(r0) 00:22:38 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) semop(0x0, &(0x7f0000000000)=[{0x0, 0x8001}], 0x1) semop(0x0, &(0x7f0000000240)=[{0x0, 0x7fff}], 0x1) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:38 executing program 3: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000040)={0x5086, 0x2, 0x4, 0x400000, 0x2, {}, {0x0, 0xc, 0x4, 0x6, 0x5, 0x7f, "80e6aeeb"}, 0x8000, 0x2, @planes=&(0x7f0000000000)={0x7b9, 0x8c, @userptr=0x4}, 0x4, 0x0, r0}) mmap$fb(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000000, 0x4010, r1, 0x10000) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) socket$packet(0x11, 0x2, 0x300) close(r2) 00:22:38 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r5, &(0x7f0000000380)=[{&(0x7f0000000640)=""/178, 0xfffffdfb}, {&(0x7f0000000700)=""/65, 0x41}, {&(0x7f0000000580)=""/153, 0x99}], 0x3) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getgid() getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x5, 0xd, 0x2}]}, 0x30}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:38 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r4, 0xc008551b, &(0x7f0000000080)={0x688c, 0x8, [0xf59, 0x4]}) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r5, 0x0, 0x50000000000443) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x210080) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000640)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$CAN_RAW_LOOPBACK(r6, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r2, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r2, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000000c0)=0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:38 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_GET_ACTION_AVAIL(0x2, 0x0, &(0x7f0000000000)=0x6e00000) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x14, r4, 0x21}, 0x14}}, 0x0) sendmsg$NL80211_CMD_DEL_MPATH(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, r4, 0x300, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @remote}]}, 0x20}, 0x1, 0x0, 0x0, 0x4004804}, 0x4040) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r1) 00:22:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x13) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) setsockopt$sock_void(r3, 0x1, 0x0, 0x0, 0x0) 00:22:39 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$USBDEVFS_IOCTL(r4, 0xc0105512, &(0x7f0000000080)=@usbdevfs_driver={0x7, 0x95d, &(0x7f0000000000)="d1b2d1f0894b0a2c43571ead026b5985027ef31189a959efc5ca680a197cb56bc628d7e2396fe1b8292f5c22f66ef574ab476cc9af2b61b0cd1f48cf9c4557a02718c7"}) 00:22:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xff, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x1ff, 0xfff7fffffffffffe}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 364.096963] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 364.106808] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 364.124972] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 00:22:39 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) 00:22:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = dup(0xffffffffffffffff) getsockname$packet(r1, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@isdn={0x22, 0x6, 0x8, 0x0, 0x80}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000014c0)=0x271) setsockopt$packet_add_memb(r4, 0x107, 0x1, &(0x7f0000000000)={r6, 0x2, 0x6, @random="7ad17e4b4780"}, 0x10) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$TCGETS(r7, 0x5401, &(0x7f0000000200)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r7, 0xc0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, &(0x7f0000000340)={0x0, 0x4}, 0x0, 0x0, &(0x7f0000000380)={0x3, 0x0, 0x0, 0xffff9c08}, &(0x7f00000003c0)=0x10001, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=0x9dc1}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000600)={r7, 0x10, &(0x7f00000005c0)={&(0x7f0000000240)=""/178, 0xb2, r8}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=r8, 0x4) r9 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x5c1201, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r9, 0x28, &(0x7f0000000500)}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001540)={0xa, 0x1ffffffffffffce5, &(0x7f0000000200)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x253a}}, &(0x7f0000000240)='syzkaller\x00', 0x9, 0xe4, &(0x7f0000000280)=""/228, 0x40f00, 0x11, [], r6, 0x11, 0xffffffffffffffff, 0x8, &(0x7f0000000380)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000003c0)={0x1, 0x8, 0x9, 0x772e}, 0x10, r8, r9}, 0x74) r10 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_buf(r10, 0x1, 0x1a, 0x0, &(0x7f0000000080)) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xb, 0x3, &(0x7f0000000080)=ANY=[@ANYRESOCT=r10, @ANYPTR64], &(0x7f0000000340)='syzkaller\x00', 0xb66, 0x0, 0x0, 0x0, 0x5, [], 0x0, 0x10, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x5}, 0x8, 0x10, &(0x7f0000000000), 0x10, r8}, 0x78) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0x1, &(0x7f00000000c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}], &(0x7f0000000180)='syzkaller\x00', 0xffffffff, 0x27, &(0x7f00000001c0)=""/39, 0x40f00, 0xe, [], r2, 0x18, r0, 0x8, &(0x7f0000000240)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000002c0)={0x1, 0xd, 0x7245, 0xf378}, 0x10, r8}, 0x78) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r2, 0x10, &(0x7f00000000c0)={&(0x7f0000000380)=""/4096, 0x1000, 0xffffffffffffffff}}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r3 = dup(0xffffffffffffffff) getsockname$packet(r3, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000bccd0d0000000000"], 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 364.447294] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:22:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r2, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r2, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000000c0)=0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:39 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) ioctl$sock_inet_SIOCSIFBRDADDR(r2, 0x891a, &(0x7f00000002c0)={'macsec0\x00', {0x2, 0x4e21, @empty}}) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:39 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000080)={0x3f, 0xa, 0x4, 0x2, 0xa4a2, {0x0, 0x2710}, {0x0, 0x2, 0x5, 0x20, 0x20, 0x7, ')(<]'}, 0x4, 0x3, @offset=0x6, 0x40, 0x0, r1}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$TIOCSIG(r5, 0x40045436, 0x3b) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f0000000000)={0x2e, @multicast2, 0x4e20, 0x0, 'none\x00', 0x21, 0x8, 0x23}, 0x2c) [ 364.910648] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 364.920789] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 364.927559] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 00:22:40 executing program 5: io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9, 0xfffffffffffffffe}, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r5 = accept4(r4, 0x0, 0x0, 0x81800) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_GET_CLIENT(r6, 0xc0286405, &(0x7f0000000040)={0x4, 0x4, {0xffffffffffffffff}, {0xee00}, 0x8, 0x7fff}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000180)=0x0) syz_open_procfs(r7, &(0x7f00000001c0)='net/ipv6_route\x00') r8 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x120c2, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r9, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) r10 = getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r8) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000100)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(r10, &(0x7f0000000080)='net/ip_mr_vif\x00') sendfile(r12, r13, 0x0, 0x50000000000443) ioctl$TUNSETCARRIER(r13, 0x400454e2, &(0x7f0000000000)=0x1) 00:22:40 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x6d01, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(0xffffffffffffffff, 0x80605414, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) sendmmsg$unix(r2, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x10000, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x4c4242, 0x0) 00:22:40 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() 00:22:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x4) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) getpeername(r1, &(0x7f0000000180)=@can, &(0x7f0000000240)=0x80) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) [ 365.235639] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 00:22:40 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r14, 0x80045400, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x7a, &(0x7f000059aff8)={r11}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r11, @ANYBLOB="32f2021d01002700"], 0xc) 00:22:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup(0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r0 = dup(0xffffffffffffffff) getsockname$packet(r0, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180)) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r2, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r2, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_SETTRIGGER(r2, 0x40045010, &(0x7f00000000c0)=0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x81000000, &(0x7f0000000040)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xd}]}, 0x404a}}, 0x0) socket$netlink(0x10, 0x3, 0x0) 00:22:40 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$VIDIOC_QUERYBUF(r3, 0xc0585609, &(0x7f0000000080)={0x2, 0x9, 0x4, 0x100000, 0x565, {0x77359400}, {0x2, 0xc, 0x18, 0x0, 0x0, 0xe7, "0180843e"}, 0x3, 0x3, @planes=&(0x7f0000000000)={0x18, 0xfffffffc, @userptr=0x400, 0x7fffffff}, 0x1, 0x0, r0}) r4 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x500) getsockopt$CAN_RAW_LOOPBACK(r4, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 365.711183] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 365.719422] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready 00:22:40 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) r5 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r5) add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000380)={'syz', 0x2}, 0x0, 0x0, r5) r6 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r6) add_key(&(0x7f0000000400)='rxrpc\x00', &(0x7f0000000440)={'syz', 0x2}, &(0x7f0000000480)="7fe2e67e6dcc221df25e8bf5d56572eb94545ebcf5c339e297b49358", 0x1c, r6) r7 = request_key(&(0x7f0000000580)='user\x00', &(0x7f00000005c0)={'syz', 0x2}, &(0x7f0000000600)='/dev/snapshot\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000500)='id_resolver\x00', 0x0, 0x0, r7) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r8, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 365.755264] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready 00:22:40 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) 00:22:40 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x404040, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendfile(r4, r3, 0x0, 0x1ff) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:41 executing program 5: io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) fgetxattr(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="747275737465642e6e65742f69707678bb8e468c1e8536b4c77ac75c308b8ed66af83044416eaf34c9d093593255149ead9745e4d1485b45d3276d1aa981181b7fecb005b8a4fbaba0c12c9088eb537df07711b503eb0547ef1bb1d08cfeff39a388452c01bcee3032ea804d776dc5413c9dee57faeeef5c4e57956e2265880fbe7c029645dd1bf9ebe892856df2dfca26d2ba7404356356aa13d89d5553479fcb2a034afa89a5bc521bec3c4e1374b14418cb742a191fac05c7a870027ac4e052c5760ccadf6200"], &(0x7f0000000040)=""/51, 0x33) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$BLKPG(r5, 0x1269, &(0x7f0000000200)={0x1ff, 0x1, 0x0, &(0x7f0000000180)}) socket$isdn_base(0x22, 0x3, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000180)='/dev/md0\x00', 0x410000, 0x0) dup(r4) write(0xffffffffffffffff, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$NFT_MSG_GETOBJ(r6, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc0814402}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x13, 0xa, 0x101, 0x0, 0x0, {0x3, 0x0, 0x7}, [@NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4020}, 0x1805) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r1) 00:22:41 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r14, 0x80045400, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x7a, &(0x7f000059aff8)={r11}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r11, @ANYBLOB="32f2021d01002700"], 0xc) 00:22:41 executing program 3: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x200000, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r4 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$invalidate(0x15, r4) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) r6 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r6) r7 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r7) r8 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r8) add_key$keyring(&(0x7f00000002c0)='keyring\x00', 0x0, 0x0, 0x0, r8) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r9, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:41 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000080)=[@in={0x2, 0x4e22, @local}, @in6={0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}, @in6={0xa, 0x4e23, 0x1000, @empty, 0x2}], 0x48) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:41 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x8001, 0x440) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000140)={0x7f, 0x8, 0x4, 0x110e044, 0x1fe0, {0x0, 0x7530}, {0x2, 0xe, 0xff, 0x1, 0x2, 0x7, "81fad380"}, 0x3895, 0x2, @fd, 0x9, 0x0, 0xffffffffffffffff}) r3 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000200)='/sys/kernel/debug/binder/failed_transaction_log\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000000400)=0x10001, 0x4) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f00000002c0)={0x10000, 0x8001, 0x400, 0x8001, [], [], [], 0x1, 0x6, 0x1, 0x4, "412e6ed141011284fe4ed0cdb26e9b57"}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$VIDIOC_SUBDEV_G_SELECTION(r6, 0xc040563d, &(0x7f0000000100)={0x0, 0x0, 0x102, 0x1, {0x1, 0x4, 0x1, 0x7}}) r7 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x8, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000000c0)={r0, r7}) 00:22:41 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x1f) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:41 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) 00:22:41 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) r2 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video1\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r2, 0xc0096616, &(0x7f0000000040)={0x4, [0x0, 0x0, 0x0, 0x0]}) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:41 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r2, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r2, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_SETFMT(r2, 0xc0045005, &(0x7f0000000000)=0x80000001) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:42 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r7, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000640)={0x20, r8, 0x1, 0x0, 0x0, {0x2, 0x6c00000000000000}, [{{0x8, 0x1, r9}, {0x4}}]}, 0x20}}, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f0000001600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001640)=0x14, 0x800) accept4$packet(r0, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001780)=0x14, 0x80000) r12 = socket$netlink(0x10, 0x3, 0x0) r13 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r13, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r13, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r12, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r14}]}}}]}, 0x38}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000017c0)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast2}}, &(0x7f00000018c0)=0xe8) r16 = socket$alg(0x26, 0x5, 0x0) bind$alg(r16, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r17 = accept4(r16, 0x0, 0x0, 0x0) r18 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r17, r18, 0x0, 0x50000000000443) getsockopt$inet_pktinfo(r18, 0x0, 0x8, &(0x7f0000001a80)={0x0, @multicast2}, &(0x7f0000001ac0)=0xc) r20 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r20, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$sock_SIOCGIFINDEX(r20, 0x8933, &(0x7f0000001b00)={'vlan1\x00', 0x0}) r22 = socket$netlink(0x10, 0x3, 0x0) r23 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r23, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r23, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r22, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r24}]}}}]}, 0x38}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000001d00)={'batadv_slave_1\x00', 0x0}) r26 = socket$netlink(0x10, 0x3, 0x0) r27 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r27, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r27, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r26, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r28}]}}}]}, 0x38}}, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x20, &(0x7f0000002100)={@local, @broadcast, 0x0}, &(0x7f0000002140)=0xc) r30 = socket$netlink(0x10, 0x3, 0x0) r31 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r31, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r31, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r30, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r32}]}}}]}, 0x38}}, 0x0) r33 = socket$netlink(0x10, 0x3, 0x0) r34 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r34, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r34, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r33, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r35}]}}}]}, 0x38}}, 0x0) r36 = socket$netlink(0x10, 0x3, 0x0) r37 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r37, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r37, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r36, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r38}]}}}]}, 0x38}}, 0x0) r39 = socket$netlink(0x10, 0x3, 0x0) r40 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r40, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r40, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r39, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r41}]}}}]}, 0x38}}, 0x0) r42 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r42, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r42, 0x8933, &(0x7f0000002180)={'batadv0\x00', 0x0}) r44 = socket$netlink(0x10, 0x3, 0x0) r45 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r45, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r45, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r44, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r46}]}}}]}, 0x38}}, 0x0) getsockopt$PNPIPE_IFINDEX(r1, 0x113, 0x2, &(0x7f0000002280)=0x0, &(0x7f00000022c0)=0x4) r48 = socket$alg(0x26, 0x5, 0x0) bind$alg(r48, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r49 = accept4(r48, 0x0, 0x0, 0x0) r50 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r49, r50, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r49, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r49, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_pktinfo(r49, 0x0, 0x8, &(0x7f0000002300)={0x0, @dev, @local}, &(0x7f0000002340)=0xc) r52 = socket$netlink(0x10, 0x3, 0x0) r53 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r53, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r53, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r52, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r54}]}}}]}, 0x38}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000002380)={{{@in=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in=@local}}, &(0x7f0000002480)=0xe8) getsockopt$inet6_mreq(r4, 0x29, 0x1c, &(0x7f00000024c0)={@initdev, 0x0}, &(0x7f0000002500)=0x14) r57 = socket$alg(0x26, 0x5, 0x0) bind$alg(r57, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r58 = accept4(r57, 0x0, 0x0, 0x0) r59 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r58, r59, 0x0, 0x50000000000443) accept$packet(r59, &(0x7f0000002540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002580)=0x14) r61 = socket$netlink(0x10, 0x3, 0x0) r62 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r62, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r62, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r61, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r63}]}}}]}, 0x38}}, 0x0) r64 = socket$alg(0x26, 0x5, 0x0) bind$alg(r64, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r65 = accept4(r64, 0x0, 0x0, 0x0) r66 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r65, r66, 0x0, 0x50000000000443) getsockopt$inet6_mreq(r66, 0x29, 0x1c, &(0x7f00000025c0)={@mcast2, 0x0}, &(0x7f0000002600)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r6, &(0x7f0000002f40)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x10000803}, 0xc, &(0x7f0000002f00)={&(0x7f0000002640)={0x890, r8, 0x10, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r10}, {0x1e0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x5}, {0x8}}, {0x8, 0x6, r14}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x7e000000}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r19}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8, 0x4, r21}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x138, 0x2, 0x0, 0x1, [{0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x4, 0x9, 0xff, 0x2}, {0x7, 0x40, 0xe5, 0x1000}, {0x4, 0x0, 0x0, 0x9}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x40}}, {0x8, 0x6, r25}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x18000000}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xc16}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r28}, {0xb4, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0xffffffff}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r32}, {0xb8, 0x2, 0x0, 0x1, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x5}, {0x8, 0x4, 0x1000}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r35}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r38}}}]}}, {{0x8, 0x1, r41}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r43}}}]}}, {{0x8, 0x1, r46}, {0xe8, 0x2, 0x0, 0x1, [{0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r47}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x5}, {0x8, 0x4, 0x6a}}}]}}, {{0x8, 0x1, r51}, {0xb0, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x5}, {0x8, 0x4, 0xded2}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x44, 0x4, [{0x6f49, 0x5, 0x8, 0x287}, {0xffb7, 0x3, 0x3, 0x3ff}, {0xf86, 0x7f, 0x1, 0x7fff}, {0x1ff, 0x6, 0x80, 0x6}, {0x37, 0x40, 0x7, 0x1000000}, {0x4, 0x1, 0x4, 0x81}, {0x56, 0x0, 0xfc, 0x5}, {0x3, 0x3, 0x1, 0x8}]}}}]}}, {{0x8, 0x1, r54}, {0xcc, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x5}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x4c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x1c, 0x4, [{0x5, 0x0, 0x6, 0x9}, {0xfbff, 0x3f, 0x5, 0x3}, {0x4, 0x0, 0x0, 0x81}]}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r55}}}]}}, {{0x8}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r56}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x5}, {0x8, 0x4, r60}}}]}}, {{0x8, 0x1, r63}, {0x94, 0x2, 0x0, 0x1, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x5}, {0x24, 0x4, [{0xe55, 0x0, 0x2, 0x5}, {0x74dc, 0x4, 0x6, 0x40}, {0x4b1f, 0xff, 0x56, 0x83}, {0x1ff, 0x5, 0x1f, 0x8}]}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x5}, {0x4}}, {0x8, 0x6, r67}}}]}}]}, 0x890}, 0x1, 0x0, 0x0, 0xc4}, 0x20000001) r68 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0xc0, 0x0) ioctl$SIOCAX25NOUID(r68, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) signalfd4(r2, &(0x7f00000002c0), 0x8, 0x80000) close(r1) 00:22:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r14, 0x80045400, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x7a, &(0x7f000059aff8)={r11}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r11, @ANYBLOB="32f2021d01002700"], 0xc) [ 367.097080] device sit11 entered promiscuous mode [ 367.174236] device sit12 entered promiscuous mode [ 367.196481] device sit13 entered promiscuous mode [ 367.217286] device sit14 entered promiscuous mode [ 367.238129] device sit15 entered promiscuous mode 00:22:42 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 367.263745] device sit16 entered promiscuous mode [ 367.297900] device sit17 entered promiscuous mode 00:22:42 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f00000006c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890b, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0xfe, "00000000000000000000000000ddc1517600"}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000200)=0x2) read(r3, 0x0, 0x6c00) dup2(r1, r3) dup3(r3, r2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 367.329026] device sit18 entered promiscuous mode 00:22:42 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) connect$l2tp6(r4, &(0x7f0000000180)={0xa, 0x0, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3, 0x2}, 0x20) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r1, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_RM_MAP(r6, 0x4028641b, &(0x7f0000000000)={&(0x7f0000ffb000/0x2000)=nil, 0x4, 0x5, 0x21, &(0x7f0000ffc000/0x2000)=nil, 0x10000}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$KVM_GET_EMULATED_CPUID(r9, 0xc008ae09, &(0x7f0000000080)=""/206) [ 367.406443] device sit19 entered promiscuous mode [ 367.446181] serio: Serial port pts0 00:22:42 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) [ 367.483993] device sit20 entered promiscuous mode [ 367.568280] serio: Serial port pts0 00:22:42 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x600, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$KDFONTOP_GET(r3, 0x4b72, &(0x7f0000000480)={0x1, 0x0, 0xc, 0x17, 0x171, &(0x7f0000000080)}) 00:22:42 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x400000, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x618880, 0x0) r1 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="b1ba161533617948d59c9be1", 0xc, 0xfffffffffffffffd) r3 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r3) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000002c0)={'syz', 0x1}, &(0x7f0000000400)="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", 0x1000, 0xfffffffffffffffc) r4 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r4, r5, r5}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) request_key(&(0x7f0000000300)='id_legacy\x00', &(0x7f0000000340)={'syz', 0x1}, &(0x7f0000000380)='pagemap\x00', 0xffffffffffffffff) r6 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r7 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x390, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r6, r7, r7}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={'xcbc(anubis-generic)\x00'}}) r8 = add_key$keyring(&(0x7f0000001400)='keyring\x00', &(0x7f0000001440)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r8, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r9, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r11, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r11, 0x1, 0xd, 0x0, 0x0) ioctl$SIOCAX25NOUID(r11, 0x89e3, 0x0) close(r0) 00:22:42 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r14, 0x80045400, &(0x7f00000002c0)) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r10, 0x84, 0x7a, &(0x7f000059aff8)={r11}, &(0x7f000034f000)=0x2059b000) 00:22:42 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r8, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r4) 00:22:43 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)=0x5a) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) set_tid_address(&(0x7f0000000280)) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x4, 0x2, 0x4, 0x20, 0x64, {r1, r2/1000+10000}, {0x4, 0x8, 0x20, 0x7f, 0x0, 0x0, "09eebedb"}, 0x5, 0x4, @userptr=0x5, 0x6, 0x0, r3}) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$KVM_SET_ONE_REG(r4, 0x4010aeac, &(0x7f0000000380)={0x3, 0x9}) ptrace$getregset(0x4204, r6, 0x202, &(0x7f0000000340)={&(0x7f00000002c0)=""/94, 0x5e}) r7 = socket$phonet(0x23, 0x2, 0x1) fsetxattr$trusted_overlay_origin(r7, &(0x7f00000003c0)='trusted.overlay.origin\x00', &(0x7f0000000400)='y\x00', 0x2, 0x1) sendmsg$DEVLINK_CMD_GET(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r5, @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="55250df5e8151f4616eb2877780438f12d690c9022c3848d9c0ff82f04f5ec4d043492f479061bdb298245f51c6160f7c7c124c7f208bc005400b9c4f06850a338ba48716b28d215805e9941ef8cb968d165a1f65cc261b50293821d21b3bf03313b21fd2e22e5148debe2068c9b57c2ecedd114ff1814ff11aae9eecce526a68edd7997a6a54fc0", @ANYRESHEX]], 0x3}, 0x1, 0x0, 0x0, 0x4025}, 0x400c9c1) 00:22:43 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r2, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r10, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r11}) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r13, r14, 0x0, 0x50000000000443) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x101000, 0x0) r15 = openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x12000, 0x0) syz_kvm_setup_cpu$x86(r7, r15, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000008c0)="ff1966baf80cb840b8a981ef66bafc0cedb9800000c00f3235000100000f30660f38814583b80c6500000f23c00f21f83502000e000f23f8b8f7ffffff0f23d80f21f835800000f00f23f8362e660f38044e0c660fc73666bad104b800f03515efc20500", 0x64}], 0x1, 0x1, &(0x7f0000000780), 0x0) write$UHID_INPUT2(r6, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10) 00:22:43 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 00:22:43 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x802) keyctl$join(0x1, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000080)={0x66}, 0x1) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x705580, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS32(r2, 0x806c4120, &(0x7f0000000100)) 00:22:43 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x14, r3, 0x21}, 0x14}}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x94, r3, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_MESH_CONFIG={0x44, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_CONNECTED_TO_GATE={0x5}, @NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x5}, @NL80211_MESHCONF_ELEMENT_TTL={0x5, 0xf, 0x1}, @NL80211_MESHCONF_POWER_MODE={0x8, 0x1a, 0x1}, @NL80211_MESHCONF_HWMP_RANN_INTERVAL={0x6, 0x10, 0x800}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x7}, @NL80211_MESHCONF_AWAKE_WINDOW={0x6, 0x1b, 0x8}, @NL80211_MESHCONF_HOLDING_TIMEOUT={0x6, 0x3, 0xd4}]}, @NL80211_ATTR_WIPHY_FREQ={0x8}, @NL80211_ATTR_MESH_CONFIG={0x1c, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_CONNECTED_TO_GATE={0x5, 0x1d, 0x1}, @NL80211_MESHCONF_AUTO_OPEN_PLINKS={0x5, 0x7, 0x7f}, @NL80211_MESHCONF_PLINK_TIMEOUT={0x8, 0x1c, 0x6}]}, @NL80211_ATTR_CONTROL_PORT_OVER_NL80211={0x4}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x3}]}, 0x94}}, 0x4008090) 00:22:43 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80080, 0x87) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000080)=0x9) setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x40, &(0x7f00000000c0)=0x81, 0x4) creat(&(0x7f0000000100)='./file0\x00', 0x110) 00:22:43 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000200)={0x9, 0x20, 0x1, 'queue0\x00', 0x4}) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) [ 368.529191] audit: type=1804 audit(1580084563.555:68): pid=20937 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op="invalid_pcr" cause="ToMToU" comm="syz-executor.3" name="/root/syzkaller-testdir087538884/syzkaller.CtKDzO/502/file0" dev="sda1" ino=16865 res=1 [ 368.565758] input: syz1 as /devices/virtual/input/input10 00:22:43 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0xd791], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x6c7, 0x0, 0x0, 0x0, 0x8, 0x0, 0xfffffffe], [0x0, 0x0, 0x0, 0x0, 0x1000, 0x3ff]}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) write$input_event(r2, &(0x7f0000000000)={{0x77359400}, 0x17, 0x1, 0x2}, 0x18) close(r0) [ 368.625409] Invalid option length (283) for dns_resolver key 00:22:43 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x29e741, 0x0) r0 = dup(0xffffffffffffffff) fcntl$addseals(r0, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs_stats\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r2, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r1) [ 368.674278] input: syz1 as /devices/virtual/input/input12 [ 368.687066] input: syz1 as /devices/virtual/input/input13 00:22:43 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r13, 0x80045400, &(0x7f00000002c0)) 00:22:43 executing program 5: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) accept4(r1, 0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, 0x0, 0x0) request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) sendmmsg$unix(r6, 0x0, 0x0, 0x6fa1c0fdde19a4b) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r8, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x9) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r9, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r10 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r10, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r11 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r11, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) dup(r11) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) close(r0) 00:22:43 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x100}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) r7 = socket$alg(0x26, 0x5, 0x0) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r9, 0x84, 0x7, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) getsockopt$IP_SET_OP_GET_BYINDEX(r0, 0x1, 0x53, &(0x7f00000002c0)={0x7, 0x7, 0x4}, &(0x7f0000000380)=0x28) close(r2) 00:22:44 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) 00:22:44 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000080)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000280)={&(0x7f00000000c0)={0x194, r1, 0x20, 0x70bd25, 0x25dfdbfe, {}, [{{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}, {{@nsim={{0xe, 0x1, 'netdevsim\x00'}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x6, 0x4, 0x1}}]}, 0x194}, 0x1, 0x0, 0x0, 0x4}, 0x40000000) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000040)) set_tid_address(&(0x7f0000000300)) 00:22:44 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x1, 0x8080) r3 = openat$cgroup(r1, &(0x7f0000000340)='syz1\x00', 0x200002, 0x0) sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000080)) 00:22:44 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$EVIOCGVERSION(r3, 0x80044501, &(0x7f0000000000)=""/34) [ 369.365379] input: syz1 as /devices/virtual/input/input14 00:22:44 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x18802, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f00000000c0)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r1, 0x100, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'bond0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8800}, 0x80) r2 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:44 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_dccp_buf(r2, 0x21, 0x2, &(0x7f0000000080)=""/203, &(0x7f0000000000)=0xcb) 00:22:44 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) 00:22:44 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000200)={0x9, 0x20, 0x1, 'queue0\x00', 0x4}) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:44 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') prctl$PR_SET_MM(0x23, 0x6, &(0x7f0000ffd000/0x1000)=nil) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 369.707573] input: syz1 as /devices/virtual/input/input16 00:22:44 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) 00:22:45 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0x5db000) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) ioctl$USBDEVFS_RELEASE_PORT(0xffffffffffffffff, 0x80045519, &(0x7f0000000100)=0x1) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000000c0)=0x7fff, 0x4) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r4}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000080)={0x100, 0x7, {r2}, {r4}, 0x2, 0x9}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:45 executing program 3: r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$NS_GET_OWNER_UID(r3, 0xb704, &(0x7f0000000080)=0x0) r5 = accept4$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f00000000c0), 0x1800) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000002700)={&(0x7f0000000000), 0xc, &(0x7f00000026c0)={&(0x7f0000000100)={0x25bc, 0x27, 0x4, 0x70bd2b, 0x25dfdbfe, {0x1f}, [@nested={0x249, 0x89, 0x0, 0x1, [@generic="b24d7c749832077e6edd4f6f6e45919cc84bf74db88031ee920d8dfcfbe1fc1adc9197958248ba829f6c6780ccfbe1f4b4601a86ff16077d6fe24111a8fe31a3e47e2fc220252f5067e653951fb34c3e9b825c801a2bed75ccf50e0a9d63509634754848eaf74da78d4ac4e187af2c6f2e6b0cc6284359239b9cf16daa040f237964c99f700585ac7beb224d706312a90ef2a844e04cefc40915941630866e1037bcd48b6ae8ddc1", @generic="ea6a363aaae7b161d0b120e7fd00aeb739e65179acc64461029eb99a06600d69eab90861c2c60d93ed1b8e4ad1d2cc9a7ce48776a4421eec7a87017fa0f98ae6783cb8f7940e67ba3fa8a1e0ac36a2e595299a44ececdff0b20b0bbdf289c94ac872b695b5638edd3268ff555a9b8c89fd84efdd78dfd5ab4d22f77307903e2b60a9eb41bc1b269833730d6bba4ec787e730b51ab63db03fcc", @typed={0x8, 0x38, 0x0, 0x0, @pid=r0}, @generic="dab1c99fb70dfdbf475c310abd5492e9d535b6336463ba7f5b5ce02691ff10392cb1b9", @typed={0xc, 0x74, 0x0, 0x0, @u64=0x3}, @typed={0x8, 0x44, 0x0, 0x0, @u32=0x1}, @generic="5bb409e125e8d3a75ff673f443dfc72cb7c9a71084d629337137d84828822ba0d8e0db19a83c7970072598d7f033c186984532eaa8d4c378a4b9a7d1397f6620e909bd1585f9a6a4ad0c6f28b741f1902ad1d5617c4fb68f5c9958cda5d865b044e33debdd2e3ed35e3b53ac4163f5272dfcfa18f420fb5055ea124866e0f7247b581988899a10da2fe5d35e13e904079b04529241707ae7d03df61fe479da167417202a86ad99bcc9c43c4b67545769b5498796fe6d208c9b09a05574", @typed={0x8, 0x29, 0x0, 0x0, @uid=r4}]}, @generic="87ba0e001c5e3e06bc6c8dc5135c6d46e4d42a7c6bc151064d3fb0e2560fc6ef53bb3bbd57c0b57e700d05f5f6a979e741d93f528b29b7dbaa4583528567774840c3238870c352c7afed8be7af616121ee349b9dfa21675b497a4b75cc90ae273879bd4d06af69c078cbae2614646d1c84c76f6bdb1976cc618055da8b942c5fd9781c4eca7ffa84b5aa9946ae74e940f413daad7592a2583d6455f2486c9f4c64c74063c12a6def139acad9acffa30639fffcb703e91ec557fc5470c9d7d9a80bab7f31435cd39a603c70f48ecfa6c85b38f5e0f1e81dd44573edab756ea43a32f01500c56e47fb818be5c61a44b6f11a040b3a82666279", @nested={0x10aa, 0x41, 0x0, 0x1, [@generic="415075d6afc4c5e11963d0c7d74e15754c0f9fa0efd045a3", @typed={0x14, 0x47, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, [], 0xf}}, @generic="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", @generic="8faa0a6aeb40cbf21745c89a5eb8064ff295560595f95e12ffe4c7ca8e2d587e3bafa0022197fa8d2b276ddb5e41818db81c25e59952f113d644c8765267133d3b1af5e56e285c272a3ec8b93052a7ad4d99d1bbdcaef426904768daec5eab9957f272fdb4f7cc52fffc198eb2c3427e1d435720317a5a1fa752"]}, @nested={0xc, 0x28, 0x0, 0x1, [@typed={0x8, 0x3e, 0x0, 0x0, @fd=r5}]}, @typed={0x8, 0x2d, 0x0, 0x0, @pid}, @nested={0x11a3, 0x59, 0x0, 0x1, [@typed={0x8, 0x4c, 0x0, 0x0, @u32=0x101}, @generic="6c4c2e43490bb824564c3cb730c2bc2e00bb2e434dc4b210a8ead26bd5ca673bc66534608dfc9c7272b6f8e5cdc1749d5c304cacb0e05bd304ca4dd58288af555f309a95658f36b9934eef64db141f9a118c7a436f658472cdd83a45e86020cc6343e02dc8e07f39d1a94a0034d7db136c9a73500e13db393ad56435bb993f5ecf130b13917ca17249a28190cf8ed673654a601b89d2bec536a0e594f99ee4a06df9411cf958418879a6703f97e7003d8b5883de63d0581cca9c4b6fe299e1576c3ff15b20a25ae38f8254b2361ffce7b5a8ee5363dd960014dd6c79fd6762dddc184eb239e6e3c01a6c33a0c7a93c1d0941fffa237325a624", @typed={0x14, 0x85, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic="f67833658904f2e8482f484968e9429df2ffb38d525b01edcf2a60e1fa1a19deafdcd6b067cf9a74d58d1813f4218a37900b", @generic="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", @typed={0xd, 0x2b, 0x0, 0x0, @str='@+&ppp1/\x00'}, @generic="b3460515b2290b3d6869a983b0997a4b5c73bebfae158cd773abce9d60cf07f24c0dc5f7d562b6eac3a55330e4f14ee1aefe4fd20c7062bbb3ff9424d4200b49", @typed={0x8, 0x4b, 0x0, 0x0, @ipv4=@multicast2}]}]}, 0x25bc}, 0x1, 0x0, 0x0, 0x8044}, 0x20000000) r6 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r6, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:45 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r11, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') 00:22:45 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000200)={0x9, 0x20, 0x1, 'queue0\x00', 0x4}) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) [ 370.541418] input: syz1 as /devices/virtual/input/input18 00:22:45 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xffffffc0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$DRM_IOCTL_AGP_INFO(r0, 0x80386433, &(0x7f0000000400)=""/232) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) 00:22:45 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) read$FUSE(r1, &(0x7f0000000380), 0x313) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:46 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = gettid() r3 = msgget(0x0, 0xa4) r4 = geteuid() r5 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="67a2cf67", @ANYRESHEX=r6, @ANYBLOB=',\x00']) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e21,nodevmap,access=any,euid<', @ANYRESDEC=0x0, @ANYBLOB="2c646f68745f617070726169736503000000063c", @ANYRESDEC=r8, @ANYBLOB=',fowner<', @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,euid<', @ANYRESDEC=0x0, @ANYBLOB=',dont_measure,dont_hash,fowner<', @ANYRESDEC=0x0, @ANYBLOB=',mask=MAY_WRITE,\x00']) r9 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r9, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='mid=', @ANYRESHEX=r10, @ANYBLOB=',\x00']) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r12 = getpid() sched_setattr(r12, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000800)={{0x3, r4, r6, r8, r10, 0x100, 0x5}, 0x0, 0x0, 0xffffffffffff0000, 0x100000000, 0x200, 0x2, 0x81, 0x5, 0x927, 0x1ff, r11, r12}) r13 = syz_open_procfs(r2, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r13, 0x0, 0x50000000000443) r14 = socket$alg(0x26, 0x5, 0x0) bind$alg(r14, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r15 = accept4(r14, 0x0, 0x0, 0x0) r16 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r16, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) getsockopt$SO_TIMESTAMP(r16, 0x1, 0x40, &(0x7f0000000040), &(0x7f0000000080)=0x4) r17 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r15, r17, 0x0, 0x50000000000443) getsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) r19 = socket$alg(0x26, 0x5, 0x0) bind$alg(r19, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r20 = accept4(r19, 0x0, 0x0, 0x0) r21 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r20, r21, 0x0, 0x50000000000443) ioctl$VIDIOC_G_EXT_CTRLS(r21, 0xc0205647, &(0x7f0000000480)={0x9e0000, 0x5, 0x44fa82c5, 0xffffffffffffffff, 0x0, &(0x7f0000000440)={0x9e0904, 0x2, [], @p_u32=&(0x7f0000000400)=0x7321}}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000740)={0xffffffffffffffff, 0xc0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000580)={0xa, 0x2}, 0x0, 0x0, &(0x7f00000005c0)={0x4, 0xe, 0x2, 0x2}, &(0x7f0000000600)=0x6, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=0xa49f}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x12, 0x5, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6}, [@alu={0x7, 0x0, 0x2, 0x8, 0x6, 0x80, 0x10}, @call={0x85, 0x0, 0x0, 0x35}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x20680, 0x0, [], r18, 0x18, r22, 0x8, &(0x7f00000004c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000500)={0x0, 0xc, 0x64, 0x3}, 0x10, r23}, 0x78) sendmsg$TIPC_CMD_SHOW_STATS(r15, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r15, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r15, 0x65, 0x3, 0x0, &(0x7f0000000000)) [ 371.136079] hfsplus: unable to parse mount options 00:22:46 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$inet6(0xa, 0x3, 0x2) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$VIDIOC_DQBUF(r4, 0xc0585611, &(0x7f0000000080)={0x1, 0x3, 0x4, 0x4000, 0x0, {0x0, 0x7530}, {0x3, 0xc, 0x8, 0x5, 0x9, 0xe9, "835147ce"}, 0xd2, 0x4, @offset=0x101, 0x9, 0x0, r3}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r5, 0x8008ae9d, &(0x7f0000000000)=""/48) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r6, &(0x7f00000003c0)={&(0x7f0000000140)=@generic={0x9, "f0ed8f67ced8b8e78c1d3a9021a227e5716f449644e73059e5187acc2a11297efa9c651c850383204864668fae48694a0320bb064d71adca80ce4072d3fb1ceea95d3ab04475f23a4181d89dc77fd484b8de3391d1f5bbb0735cc06ea632bc40dd79e9a0a8fb1d249287aeac1565030000863450830429ea6217a7b30f7b"}, 0x80, &(0x7f0000000380)=[{&(0x7f00000001c0)="918f0359da907bb8956cc6f09870c8ea7c0e0e2934e2b031111ff277b975b0c45fb014447ac1e537c6914f2c4bf9514b7c75df8c1c3269338fa1fe0680d162c96c", 0x41}, {&(0x7f0000000280)="35aa1301040293cc2c0a99af7497f7d11fb22946f575899a6fdd1ae73b0ffd4f231555cfe00d4b34d617a5ec7a33d7b1ce8a5e5e1b181cf914fb7e88f54dce1c0148f87da0062779c22bea413a0bec37d23e7f87432dce6df1a3f17acf4ac3349b294ff29ed1cb3292b956506111af9958ead639883c500a6e20810a2f2d99181a05ccfe2ee543", 0x87}, {&(0x7f0000000340)="777e402df18d61b95322bfe9d45c1bae31933a8a6452a4d9e78cd64890270d5f4d60b263a1df", 0x26}], 0x3}, 0x20000080) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000580)={r7, 0x3f}, 0x8) 00:22:46 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r11, 0x0, 0x0, 0x0) [ 371.275988] hfsplus: unable to parse mount options 00:22:46 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="20000000420705000000000000000000030000040c0007800a00014000000002"], 0x20}, 0x1, 0x0, 0x0, 0x40824}, 0x80) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:46 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r6, 0xc08c5336, &(0x7f0000000200)={0x9, 0x20, 0x1, 'queue0\x00', 0x4}) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:46 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) [ 371.442694] input: syz1 as /devices/virtual/input/input20 00:22:46 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$int_in(r1, 0x800000c0045002, &(0x7f00000000c0)) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:46 executing program 3: r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) utimensat(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)={{r1, r2/1000+10000}}, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) ioctl$RTC_WIE_OFF(0xffffffffffffffff, 0x7010) 00:22:46 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x9}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000380)={r0, 0x0, 0x1000, 0x3c, &(0x7f0000000580)="95b1e805a78c5283ed4bfa85ecf793bc7398707f5cad80923b598473539b56f1cf4fc6571209c01a7d7f01baa2f745de430f0c82403dc86f8090f87c6a402aaec32e83aaba0e2c8a30f86ad4c9d725e31136ae9a4443019b5ccc19d8565240e6110757225e9f41e0cea1d898252446639e896abe6fd8dea94aea766ee55edd8f8a5cb479e00c6ffa7c01e6e2f2e43771a8a289d69679be0216446a59fcc0f2b7790dc250e2898d4fc1de5320ec3520420e2ec5f159591f79115f96696cf3dc841a705b48b45cbe19ee6aed4c48410fe82ef808d8b558fcf23705e96fbd51031c95c670694525ca5a88b60cbbff6ae9f96d7a8365dadd4d26aee222792b80950e6eb630517827da381be8e7bd02a7097690868fcff5e371450f9be6b803d406c1a1cde099c5e6d221be1038e5452d0a9931a8772f17f50d3aa51f34b41668c12f5aeb32acb9ad8745603b8974a9da843ba31a261a2f08c53d42720932f40509756b4f9210786cdb179ac1df4d9787395bce35b34df39bd71a0a8e5d91004666c8f802764a069b666a7c9aea9ce5589a8b8509a1429238279f0e1d73ecc2405af2d3fd46c3579da2a18c8badfb758fb595788bcf0ca2e69883b48ff80881c8317491a369ec1a27876ee2aab3a7699bd99ef461f950f74499915a8b5776284767bb953efdbd04ae8acb1b9a66124ad0a5dbb4423463e7ea9c47192ae5f4e967e17c04a122f375fdb824ef4dd95d3f6b2b707b77080480102f64cc4def18726d7bfe20411c0a7b861f6a7ff8915b3bc5ae92e6a0c34210f4067f966dfa13dab3e44eb0a2a1cd546b16a66d0ae99eb8394facb3eed758b42c0657a0e525ea4541e91aed8c1fcda7828bb2883df7f62a87c27d0ddbcfeebdf9fe17701e3432e8ed7908aa948cc657b4b554990c49ff884624aad70584b688cf0ae6fb751655dd0f065eba08b45c50bec2589878f23dc3e7246c2981988b075938fe6ea663034db576c79dd0ad2eace4c766248c271e2cc72bd0fdfc62d9c5f9d0d25959199905462a64fba8dbda5c673f1693406d4a5b60b80f5d1e149436c2b0a00f85f463d23c871fe9769316ec753a5d266d4bd2290aaaefabc9937b4d9476c98486b746511bf046e0d6bfbd603e291dceb999385a8156aaf72819d2637879566f69684eac3ee1435857090968db4f8f35a229fa7ec4ac52c833087caaa291c5899084151e4e47be62e43f507f8e64213f88a327914fb77aa17c5b15b118c79a4d6ff5fbca3149634aed7594d4901abd27a8047a60f387abb122c4a3bb65ee5b73cec060684a757f9509b23e640f146b2184e9c02f614ba978e022e46416fb05cba2abe642cd5c90bbbb9111f8e270d2c04df3fa8a861044fc501ea1c983ffd1f5821e2765938f24d3744669742b644d6c44f5fef1a0d1af6e9ceb6d1284074d34062c2f8bb5538c0da4e16c31d8643d2bbc806af287d200aab98336fd84f8eeec1f75cc9a5b7e3c9314b5ada2d4035974382e20e12abae4a7da27b601fad083a82630c27fc23cebe9f5e51e80ed4394f1d67bb21f521a96868cbaf1f3052269b91b9713615f41b1f4eb277d7963c6811362eec38149bec2356ae8bf60aef3306f2fa015950d4ed7bbbd87d79cd1824792dfcb30c178c330040e308589db10b02b22bcdf2d4542374e53ef180fd20c5c665d6c7999b7f6296d6c61666a6b67b551476f2f01197c383697aec966efc98342c298d56e054a696c8aa94f0af7fae0f1f580dce8048fbad9881675557fd899de3e81a66d8a3d672a582acf387e115fc28299d30df7fe8bb822f83c2bd5dd9fc52643f017b0227c0da630e8c66ad7d2e38ebfce1f684e6fd057e7301ac5eb1d7b143da194c62c7c38f6ed7ba773a65db28ed134660b8fb58d82b4841e401063c316708b2338d29a09fd891be1318e5219e6394defa771030d19a3a7662e6248d605edc01d0c4fec7a88667412f02d4b08caa93fdf728f9e99f42849fe89cbc2ea0967fb96ecb845ffd590ea4f1528f2b0fa2e786ea3bc1b870d179860d86a4653551c3aa3da980b6b56cf9abba19895edea738ac7e076590eadbce0f5cf8da73df46f007fb8931db491ad5fe12e8a17f337be6206b8699557e11f7ee024b52189f56fe1cf70af41dd9d2cd2da44db4c679e9feaf1e30ad370dc968fde4dea33e4ab43c93559a1766bdb075d5227daa842710d86bd7340dd389fb728cb363d9720d6894a552fac4bc0eff8b0b41a97e09f993ba33524ebfff07f5f62a60bc013a1a88cc2d438bbfd5279f0c708258d4469f046fc4176c4df3eeb6abbf4456eb90e9a502cd5c1a71bbc914fa02b5f1d4f684bd1881c9c48e301303609481649a18336eb8a6a99563779c0ab2943cf0c74e81acce7bdd3d7a13ae5f310d792a919c82cad4dca893943a842ff0a9e83412461ea687e9ae48b8cf693d449fe8223abf8dbaef5d485a3abc4f76d1d8fe8fffcd6de0a050ecd904fdb3b68493064751df6be687fdbcae86da38867a859f0d5e04345d49c2611a8fd94cdb63ba4e6a142aad31738a1e80d7840d24300fa46023b7a53db44e2b191d70e1aa56e4c1cab1d6bda467c8b07ddac67e1efc120c5172e8ca0b2724ee4ea86d3d6644e308cb3751f2140a92e728b15571b4e97e1b76b82953b7b9abad3c3731f4bb51c9de6c5536bade05dac63f3d2866fd33026cc185248ce696f9424317873a4c16a65177c9863a6ed664e481880d9eeabdd7cef73fc2f546a5295f94fe4b92d44c9695332d08a59a6ef208f6de19fc401d54165e5c300027a9cf43c8c475c4be9653901cc17294eab868aead006145c07e7392bcd2b76a11b8d6764243c9fec406ba65babea063ed9a0f1c61390246b26b75e585626172436d62298e5707bba21c781c436283560807876bf1c1454636771dd3d7c8e2d1e5ede1917411b25fcb339cf87ed3f30ea545afd76ce4669bb79869cd7339e55293d4d34f49c358d8760cfe5d5e7a024fc8282e2fd25c723ffa83f930bd91a13be0b318c3846fbf2edaa2ce4cbeb4f2ed904b0f35b492f4e26a80843788e07c478339ed1ed412b723d989f6763633829d219be9f416ff1676c557584fcf71c329f49228a394708ff395152e93c0215a5bc173f8a50f6a15eaaf54deff7989cc1d056e765e56faccc0980f51bb01ff35e502e4f5e9c5849d8acec15c556503463fbd6c722d2cdd1364a6550fe83cd5061622b8527be9b9dfd4b16833ab3d09404d2269774c9674e75187bfe4a08721f52c57201605cdb8eb27ac5bf4bc2e898129dde1a5c024b13a728ad66f300e9746adb133364bcc3061292194222cf84c41e3aef62288dc5a982d105aaeb12f4295cbda919171d6240bdf42fbac0bbb52ae6f898a8948afbba94da3b4d26344d83ee2bf6ad199ab186ce36eea573e70765a3091de7628533584af395f524ee95fae10bf5bfa5af99a80c62feb8647f91f0d9db4567a38ac743c8ccbb85023772163e72487795154f9f244dd0320954bf98502157d1124ec416ed13c69233b44b0349a12e024b58b7f51ca03aa6c2330268c2c7c0c3748f15cbed9a17522c41eeb4da506125103a52a7c0e228e13f727ffda5ccb4c17e77a355cb421480d76d835aedaac14726e1aa071376edbd632fcc7222cc61663deca338da9cdffec018da11e6bd2468052d08606fae10e692c12b601585697a9789f963f253fec09dcdba8a03f7dbe0293c1eea14a889630342390c4e9394cbb1fd8eddfbdfbcb07ef7e3eb8a66700f68b19e4f1efc4c188aa2c27ba14d0a0fc55bb6d683816fbe2c60263850f7641a5d30cb9c13c37a31cc578dea241e592ab442e4272f6d31e48d4b20b5ed5b5e2765c952eb43710c4e91dc5285d54aa4d5b0db11428cce7ab5fdf5a4ed7154d24a2d5c7e123d951c090ac2bc107c7d3fffef8c842a32b43fa209266b2b3bdb866004e3817d3742109b4f245e20542472eb5f574352e01134111e418725b9bd0b3e12751801ffc18f03777009442b4392272c968e7711936c086d83232ac3511cbf0395367ce4c7b1a555114c3d0cbd85463ad2ff3fabd5fe0f6a5f128dc2410a91393327f6ae08d639736d61be5d2a8e4fa9918a930290a6d46c75628bd1c094f4288d8b4057c19e0873668ff6896981cd12b4c44678cb63401974172d56b5806ecc8861c8699dc3918eb12545733f598da823d94d6e196d6644c081eaa8cd3770471683a21c5f27f29f437606ae8604f2b26084e7c57ebe3282df5f41b1cbf7be6f6161df787b73ed9c055b47f78f3c34cf60b4c806d28b41f8a0bd9d1b723ce5ae8935918c316ca4219b17450780432aebcc264a49f2c813d3c13b9c939d9c0701aef7689fb0443e66dddad746118f1e8dd78c0614c553c3b8c27452e65a46dd80e48baa184b3a2f3c70ece6f28414904f18612416fc19dee743c6278d6ee295818d7ac021d3b73e81ea5cb75976038908dc88f338c288aea6f7c84f691f71b53154989d0af04d0a0338e884583226d2e1ccc566dc37c05f204d7875b3add186fa1a1434f488b2f50144d42db2c03018f8c5eb541c685d615f483c283c4e2082c9c60deef5f87c71a87dcccf7d3c99e96dd5f47e81d910a5e9832e016d1f966ca451afa2e4129749d5455a018ebbdbbd192538e560e739a04ec33dab3f5caa99649bfdc88b80045799858be1bc749cf02893b065febe15faef415104a065a8a9f43eb76abb564159ef264710e637724de313f183361a6641330aca4b2c185bbc7a0be9ca9b31ce5e8674d2f0d026593669040ebd5e58ee4355a89c27c179e51974d19599662797690245641a4c005a42edc5df5ad256e5d57f080f167465b516ff21dd87b4c8c5001eb03cf493fb469d4bbfcba93177f9bb8e2762acd575f22a681748aa2d8edc15706d8a853339f30c59fa59c009f3971c5413d2966ebd51694b1fbb995df2a1d1cfc0069952cb9ec913545a0f7e9bcce9e60a099d8f1230c177f9164c3f20e1830c7879b76aeeeda8206897286d4752b0bdec72b0b60f2aa7457beea2822479c7527408b0ea99e952bc3ee86be1f9e648181a6f33aff4e5e407ab36cdc425b0b53e6548ff8aa4585a0978257de87988c4384f67f8dcdef5e2ae45f369feaa0802478e52c2da684d2b1d2ed3f09d2672c7ff4311ee620c0c08c09f959befcbfc0fdf6ceda3a805a3d0e59b1bdf8c2f3a6b2a3de2f8b7e8085bf0e42d7f0b16954bb25adf5627048442ed8c27f24d088b7dc39203234edad9c681d76ae4f56ba6352b7a0d5530ea064143c93b5fa6476cc359369418f316ce7499d3ba7b94c0311807b1cb2c0d72475a46d313f45ce6a148c8971070b8c381cf1dacf265ffcca6d021cf8f61d0b6e4118d3c60f383007f02d084ee2d653c74e7c2359c8cb0203d53f592192571e727226c31cf0a0ae085d9108e9d45ff0a1cb319c92cde635e6a8fc5e5eaed6f48dd53bafb2ab8a6d4cb9a386d66b51f2010fcacb91a0a8f80c35d0a9250f5b3b79b0f08e72a5451384b56c58539911e8401b1c71bf65f71a17e0b4c8a25ce63fffd349c7104935904c6eb5130708d0950ae970e9d05d635cd882991714dc92f2a35eb6fe26864997158c8567da50b6f83c0fe4dd756c3241c6712f29683d349a81043cb9094c93ce3affbddc7a2cfce16037a13d862a2863eb06e09bd50e0184d58bb3a792d8cd17995b12116c84091c388467b245bc7bc22e6bff8048ca36bff61cd8fe95523dcf88734f8847b65d7c2e04c29d6e78d816015ef6f5b0a21665848cde21cf5a5", &(0x7f00000002c0)=""/60, 0xfff, 0x0, 0x72, 0x1000, &(0x7f0000000400)="4228cb2cfdabb1549a1728f0119dd4300874d9ab793047519ace8379ff9f0a554cd0486ad88858d812b225d1a30cc8316544e18852e231814a7d430704de5fe18af689ac78cb009ecbce36242a07d7bef0af86d85957ea9626bbbdd4c248e305e0d23ec8b90aba0451992ffa3262abb70f34", &(0x7f0000001580)="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"}, 0x40) r6 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vsock\x00', 0x42a481, 0x0) close(r6) sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000500)='trusted\x00', 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r7, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) 00:22:46 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000240)) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:46 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x8001, 0x688440) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2000, 0x22) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r8, 0x65, 0x3, 0x0, &(0x7f0000000100)) 00:22:46 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:46 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000000)=[{{0x3, 0x1}, {0x1, 0x0, 0x1, 0x1}}, {{0x1, 0x0, 0x1, 0x1}, {0x4, 0x1, 0x0, 0x1}}], 0x10) 00:22:46 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:47 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) 00:22:47 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:47 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:47 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = request_key(&(0x7f0000000140)='id_legacy\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)='cgroup)\x00', 0xfffffffffffffffa) keyctl$restrict_keyring(0x1d, r1, &(0x7f0000000100)='encrypted\x00', 0x0) 00:22:47 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:47 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x400000, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$PPPIOCSPASS(r3, 0x40107447, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x9, 0x1, 0x2}, {0x1, 0x1f, 0x6, 0x80000001}]}) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x48400, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000140)=0x451, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) socket$tipc(0x1e, 0x2, 0x0) r5 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f00000002c0)) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 372.274028] input: syz1 as /devices/virtual/input/input22 00:22:47 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:47 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x17, &(0x7f00000002c0), &(0x7f0000000380)=0x4) close(r1) 00:22:47 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:47 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4040, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x8000, 0x0) 00:22:47 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) ioctl$KVM_IRQ_LINE(r0, 0x4008ae61, &(0x7f0000000040)={0xc605, 0xe7}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r1, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:47 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) getsockname$netrom(r2, &(0x7f0000000000)={{}, [@null, @rose, @default, @default, @rose, @bcast, @remote, @default]}, &(0x7f00000000c0)=0x48) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000080)=0xf) 00:22:47 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) socket$alg(0x26, 0x5, 0x0) 00:22:47 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x80000, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:48 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x802) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 373.210817] input: syz1 as /devices/virtual/input/input24 00:22:48 executing program 2: io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TIOCGETD(r3, 0x5424, &(0x7f0000000000)) 00:22:48 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:48 executing program 2: io_setup(0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r10}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0xffffffff, {r7}, {r10}, 0x2}) r12 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r12, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f0000000600)={'batadv_slave_1\x00', 0x0}) statx(r0, &(0x7f0000000640)='./file0\x00', 0x100, 0x2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r6, &(0x7f0000000b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000780)=@delpolicy={0x314, 0x14, 0x400, 0x70bd27, 0x25dfdbfb, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote, 0x4e24, 0x101, 0x4e21, 0x2, 0xa, 0x40, 0x20, 0x3c, 0x0, r8}, 0x6e6bb8, 0x1}, [@user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0xa}}, @algo_aead={0x11a, 0x12, {{'aegis128-aesni\x00'}, 0x670, 0xe0, "59aa2af643e0d66dda97b918d79ede6f13369743c875056db68f3c3f7b7d546ceb05a3848f63ad80e54ef00012c3c6079c8fe0235d7b409ea2dc97e9ccd6217ed46598368b244c6b574e2db7198610bd05dee7362013201bbd26580bc7ba80fefba68c240f7a46f53af96ae05dbe5b6288f20f35def748bb00ee49314f60c5dd0fa3d9291517e52221e1d49a36d07e4f8447199a830316dd8cd0a4d5c0fc73346378574a3c3dd70c451611ee6db1fdb12cca58286111f8bb845ee5425725cff5f80cbfa7b43611341c78effb6525"}}, @etimer_thresh={0x8, 0xc, 0x400}, @policy={0xac, 0x7, {{@in=@remote, @in6=@local, 0x4e20, 0x100, 0x4e23, 0x7, 0x2, 0x20, 0xa0, 0x2, 0x0, r11}, {0x400, 0x7, 0xfffffffffffffff8, 0xfffffffffffffbff, 0x7a, 0xfff, 0x0, 0x80}, {0x80000000, 0x1, 0x1ff, 0x4}, 0x5, 0x6e6bbf, 0x2, 0x1, 0x1, 0x2}}, @srcaddr={0x14, 0xd, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @policy={0xac, 0x7, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2f}}, @in=@dev={0xac, 0x14, 0x14, 0x3e}, 0x4e22, 0x81, 0x4e23, 0x6, 0x2, 0x0, 0x20, 0x0, r13, r14}, {0x9, 0x1ff, 0x3, 0x401, 0x2bf7, 0x3, 0x8, 0x4}, {0x80000000, 0x1f, 0x4, 0x7}, 0x2a09, 0x6e6bb7, 0x2, 0x0, 0x2, 0x2}}, @etimer_thresh={0x8, 0xc, 0x5}]}, 0x314}, 0x1, 0x0, 0x0, 0x4060085}, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xd3) r15 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r15, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r3) [ 373.429262] input: syz1 as /devices/virtual/input/input26 00:22:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r9, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) 00:22:48 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0xc) r4 = syz_open_procfs(r3, &(0x7f00000002c0)='pagemap\x00') sendfile(r1, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x80c0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000000)={@remote={[], 0x2}, 0xf, 'vxcan1\x00'}) 00:22:48 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:48 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)=0x81) [ 373.823858] input: syz1 as /devices/virtual/input/input28 00:22:48 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) socket$alg(0x26, 0x5, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) [ 373.935842] input: syz1 as /devices/virtual/input/input30 00:22:49 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x4, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$mouse(&(0x7f0000005400)='/dev/input/mouse#\x00', 0x8, 0x8540) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r11, 0x65, 0x3, 0x0, &(0x7f0000005440)=0x2c) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x800) r14 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000180)=0x60) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r14, 0x6612) r15 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r15, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r13, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r13, 0x1, 0xd, 0x0, 0x0) setsockopt$bt_BT_VOICE(r13, 0x112, 0xb, &(0x7f0000000000)=0x6, 0x2) 00:22:49 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:49 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:49 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x81) [ 374.329071] input: syz1 as /devices/virtual/input/input32 00:22:49 executing program 2: openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(0xffffffffffffffff, 0xc0045006, &(0x7f0000000080)=0x81) 00:22:49 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r9, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) 00:22:49 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$NFT_MSG_GETSET(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0xa, 0xa, 0xc00, 0x0, 0x0, {0x7, 0x0, 0x4}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x2779b0269476f0ee}, @NFTA_SET_TIMEOUT={0xc, 0xb, 0x1, 0x0, 0x9}, @NFTA_SET_HANDLE={0xc, 0x10, 0x1, 0x0, 0x2}, @NFTA_SET_POLICY={0x8, 0x8, 0x1, 0x0, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10}, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:22:49 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:49 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r4 = getpid() sched_setattr(r4, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r5 = syz_open_procfs(r4, &(0x7f00000002c0)='wchan\x00') r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() r10 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r13, 0x407, 0x0) write(r13, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r14}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) statx(0xffffffffffffffff, &(0x7f0000000bc0)='./file0\x00', 0x100, 0x10, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r17 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000d40)={0x4, &(0x7f0000000d00)=[{0x101, 0x4, 0x2, 0x2}, {0xffd0, 0x2b, 0x8, 0x6}, {0x20, 0x1, 0x67, 0x525}, {0x9, 0x1, 0x3, 0xfffffff8}]}) r18 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r18, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r19 = openat$audio(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/audio\x00', 0x400, 0x0) r20 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r20, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$sock_FIOGETOWN(r20, 0x8903, &(0x7f0000000dc0)=0x0) r22 = geteuid() r23 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r23, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r24}}]}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000e00)=0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r26, 0x407, 0x0) write(r26, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r26, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r27}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) r28 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r28, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r30}}]}) r31 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r31, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r32 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r32, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r33 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r33, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r34 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r34, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r35 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r35, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r36 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000021c0)='/dev/video2\x00', 0x2, 0x0) r37 = syz_open_dev$binderN(&(0x7f0000002200)='/dev/binder#\x00', 0x0, 0x2) r38 = accept4$vsock_stream(r1, &(0x7f0000002240)={0x28, 0x0, 0x2711, @host}, 0x10, 0x800) r39 = accept$ax25(0xffffffffffffffff, &(0x7f0000002280)={{}, [@netrom, @null, @remote, @bcast, @netrom, @netrom, @default, @rose]}, &(0x7f0000002300)=0x48) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000004c80)={0x0, 0x0}) r41 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r41, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r42}}]}) r43 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r43, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r44 = socket$alg(0x26, 0x5, 0x0) bind$alg(r44, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r45 = accept4(r44, 0x0, 0x0, 0x0) r46 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r45, r46, 0x0, 0x50000000000443) ioctl$TIOCGPGRP(r46, 0x540f, &(0x7f0000004d00)=0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r48, 0x407, 0x0) write(r48, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r48, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r49}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) r50 = socket$nl_netfilter(0x10, 0x3, 0xc) r51 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r51, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r52 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r52, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r53 = socket$alg(0x26, 0x5, 0x0) bind$alg(r53, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r54 = accept4(r53, 0x0, 0x0, 0x0) r55 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r54, r55, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r12, 0xc00c642e, &(0x7f0000004d40)={0x0, 0x0, r55}) r57 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r57, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r58 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r58, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r59 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r59, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r60 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r60, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r61 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r61, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$sock_FIOGETOWN(r61, 0x8903, &(0x7f0000004d80)=0x0) r63 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r63, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r64}}]}) r65 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r65, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmmsg$unix(r11, &(0x7f0000004f00)=[{&(0x7f0000000440)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000b00)=[{&(0x7f0000000580)="007b7e3363d7047873eaa1a40ba8afa5e86316fd43dd70e95ea46a6bb1cc4efa5433251ca2d4568e8e278c52ac696ad377faefc527c68aecdda5b21eed51cd3875b6c6d34e18c4e03b83cf7e6095938f2a3f27c50050bbbfe168ab63acc8754c23eeedbdc39737ffd3b4b1afe3382672d3ec10bc9ee521db1379d0001aa0969a392119f60e2a030db61fcd255b8d4b9a908296591b220fe2492392b2c9648dde4aa2f5e6ec64c603ef85fe2b0c10c5f2e667a69bb1a9f02ec3326ae6719d2e68813068c11560d3b5b69b216c0995c2aa0ca93680d939c3aca0df52ec43e57ad436d53026d81592e13397e2708c37757733561f8ba2", 0xf5}, {&(0x7f00000004c0)="002dc84fb073812d81f2c3834b5563cd3a053e5ef3718d5a667af0a2a7922b4cafa876e529afa037b1ff4a52ea1e45db3e896807109f57902077ff40a7dc847bb472a8e6cb68", 0x46}, {&(0x7f0000000680)="c361e173d342a16f5a678168acef419412fa0dbce29ef0f1cdd8d47c9d691eec205f393babc34dc2d1c7953fe578e18c2fea396c85760ea39475d0bccc4a83626a8b82cf5c1e3bd3010ab5051a861d05c9", 0x51}, {&(0x7f0000000700)="106f3421a5d528fce19d2635452d6586f221cc4a6360da299bf2c9902a580d347f7a3bac992f010a4044bd7177e456592261f024f2b55b85f0d9aecf05a5d4926aa3450ce6b121e43056839b0ecc59ffc9eddca01d2dec52bf1587930ba258e7869fc80e488ae1f48f4af91b408ac3d397eed2d37c78f479ed72fdc5f2be188e3752052bf255f54eb49517cd517012cae05a12c41c5c0fd09c43b01aacd10f8c273255b6918507b867be4a819252e771002a09d5575a0f9600177b1aacb08e95a0df08ddcd23cf8a4ba2efbc12465ee5c15a11db", 0xd4}, {&(0x7f0000000800)="7d2c435281031ea316ab9522f12d3c79618ee0cd15b24b8c0ec21304362fe7223a279fc17d5230b2485a49fbe18620f806d253fcd3cc9dd30099f0abb7f02435be9070c8655c0a2db642b10334f5c70da39ee815b77de81ca46b7f4ef05d48133930b318a98134833b7bfe756af5f3cffc1b8b12d0e9fcb3fe96785a64d90b0daf2fcbe7053268e77c0fac36ff33cff750e09d5f2988f28fbdad898e4d0d7396f2b9823161c2dc3b6dc4c6b2053e63ea92a756f42d2db4d37862ec08a14c5e5f8a115ea1c004d24a4c8e8dfaf11609a0f54b7179864ad3a9241e0965ed9802113f2edef1", 0xe4}, {&(0x7f0000000900)="f54518472b369ea60b82182e986dde2ffce3f86d190e1b2b174017a608", 0x1d}, {&(0x7f0000000940)="edf0100d0ab951779b931d63f452cc5608c25b86d3ab5a354d19b91f004414f3f369923ec776de16b28b3932f185de33a3868bfbb955490789a4f613e70eced95ab59e89e27990c5a0d228ae5de8c59646d9798f74d5fc8b06f21c807545a2b754a11b7a22e2662e05df84b41682340404e05ab7d17774aaf8e9823891dc55d2d1c36eca9900390208ee4d56002c3397eeda9edbf69a600ef99243a92e8a8296270f38e936277d0f7dd73677f3a94518355ecfb5", 0xb4}, {&(0x7f0000000a00)="99e8da6b5626f9d201463e1ca7f8ee536d428fe094f9af8d5ed214396a2e171f025b5f0ad2048528a3ba30c4e718ae777af6a18a28fa322c65f18c34eb1aa7ae931ff9f415f38b2bf6be3336fe980b64107acbd62f735adac07fce4a23d12616614838d6ce7ea123dce230f4b13d643161eeb5d704a19397fc64f3949c141ed1edacb3a2b54c9d356dc8436594d887791891d546e6d0fa542dbe1b10af6474eb7542cd167b30610768adf16e9c80a11275ed95d2e99627912ec5", 0xba}, {&(0x7f0000000ac0)="b052c988682c7f453168b2e74c5e2a569858976cb1cb3c7e0c5d7a28d26ab419", 0x20}], 0x9, &(0x7f0000000e40)=[@cred={{0x1c, 0x1, 0x2, {r4, r14, r16}}}, @rights={{0x28, 0x1, 0x1, [r6, r17, r9, r18, r2, r19]}}, @cred={{0x1c, 0x1, 0x2, {r21, r22, r24}}}, @cred={{0x1c, 0x1, 0x2, {r25, r27, r30}}}, @rights={{0x18, 0x1, 0x1, [r31, r32]}}, @rights={{0x24, 0x1, 0x1, [r33, r34, r1, r0, r35]}}], 0xc8, 0x48004}, {&(0x7f0000000f40)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000002180)=[{&(0x7f0000000fc0)="f5755cce267221fcff008672179555c9e65a15d2e70b598846c9850ba9f6787f5a41611afeb2ef011c7e2495b3de7e7458fff4d9d438ab5efa52f7ab4ac4769611ded423fb70962c621f39eeebe458df863edc209963cb593ca4ae9ab42699c0ba1adcc1e1a2d1a11704f7781d1aad5e5159577fd6d4e6ad8c3385f6ea9d2dcf0cc949ad152dc8b398e34d6baf15b802efe5f334246335171a22e757e388a4b6a73e3acee494950bcf4a3997856c34febaf40e7d8b253903b8645a9e36fdf61efeae284989850cd856373074fd77fe4adc9927fcf9d7118f321f43dfb381eef69ac8bb09e1e59b94", 0xe8}, {&(0x7f00000010c0)="116469d31fddf28c12b7cfa7836806b6c4b0a3cc2446ac1c5974484340734e12c8dd6173563faa47f6f367d983bcadd2085e602d5ca8f4c02543c3394cc1f93ee40c4261b4e19b7bf729d13a4f1cfce821ce2eb6ae947bb1a992d8943689b9ef5cb17865ae5ba3e699def34c8cd5df6e3600d7916c5b78ec75db096f24babe0cf2fe99dea95e9582edc041837b7407bb5d5c949d76574432f6384972568d12a0d048079f9eb8413e0c53bba6009c00c4515af4ea0b9ed7df7676bbe8328b2b0bd3f10b234ebc1bb536b999fd5521e9637f0b1ca966d16174b9973ccd8b39b8ba959b4c57d9513c86cff66a55da6ec7c515dbaa67fa83bb55da126a05d6f5ae13087a58acb43761e09b7b3747adb17399e3251d8d1816128e6226d83cc19a6a2d2ccf7c1570a20aac63502bb4f8ec1522c13db1a8fda7dbfa58cbeab8822c327abfd84e8491388c2e30476f78d99728cae8abfdca2fe07762a75e1454c946f8a6f47c9e740f24d51612b614a0f98c0d31c11103605b23b8710c0cffef4c8d5b5185cb55a177c7704bd4803491b5ed40c9b6e9761939eac0af80a0af439ffa999d6f3bda09f5754c1d062ee3a76da884beea94bf9eb17c8d653a7ceae7091fd6eeb035b2d471497bf779da421425d739c6c0f98acbdd6898dd96d98a3a145a1862809ab87bfbc029e14a8e7dea5abebeafa532c91c64a29aea9bfcbf1eedbebb32752b93ad57e076f07a3e47821ff8dc05f7901f0e53f37230c52f114316f7ea0b1e4f5a1b470c25901a885fdbf525f408642ac59a141fca5336e85c030a301d8a20383cfc8497cfd7f430dd7aeba170122e41c7451f59f3951015e303b628503a2f527e1ca8216d8a19770698bcd0fcbc569849c3bbbc412e8a5af95414489ed60f238559a0066aae6574e582abf95f64afe6f9b14a6b87968e97ba8152af2c24d5f84a2bfbd466b7d852daff5f9be2ba6c9df1899d7027f5b0dec31a302697e07063fa6dfa546227432dc976bce88d0cef88c71f2fea36f0d3824966cfe3e32bc559d8342973eb869dd85c06ae1c1575be15372fd240f220199400d3776d5e8ef7acd267d4a6e0a73d57a3bfbbee830c8d69169e4c2fc0ed6635277a0d4b04b0f602b46dcb6ea8a8e95e2d6764005b6a173bf9c1eda981de275655ea14ade08aa4b1819fec50a6994aa13e3772d2f53265cba0367f3fedaaea5e35b36f99b5788c86ed7c7d81398f11485d90b429c233604cdf9732baafcfb0f2b3c73327fe298cd3aeba66c569a47fb60ff2412a6a5f13c0cb83017b00c37a502c67afde741f3dfe6b8aead69ab8ddfd1093187b7a15cfd2c3790c72370d16eda6a4455842d6370a1201ad728739acc47fbca63e5859f273c35591b3c66f33431d1503183913d844293ee69f350a710814ff540fad99143c73111ee9226c264c1bfb0048ba85b1991e2ca51e5ef84efd3b6d7cfb2b4823b64b83e4610b1b23273facdf91dd34423f3d87e8c72739c7a94a4c514611c4a981cd91d6634b3f82739942c17d62db04d0b6f581168acc6ca541b0a8d35c85bd6dcde641873a429609bf2bf52d056a5ef978f717f62f67e831e155ac4c9fac09ac95416ff0b1ffbe228c73889f35e183ba6727a3584ac9570fcda9ed282f6353516ec2da30189f8ddbba19225eb58a984fbd4f1ad153f5f357ca17091ff0a26104448ae3de6caacdc001c6bc69b6a9674eef6b9a79fc51841c8563744214986e81cecdbdeea11194a51993054514677d78cd635bfb612ce418c6c90f637de8fad1f674a96e35c4a12b8967af803483925f676ee684a1fbbe004c7a97e2022622a322bb9dcc140ed612176c9413dc9cab1d2446d846894f48ed9dfc946c9eccbc095f6c711eb7fabc110f19303572d61e81b6f704c1e9e817de79485ed7f320f13bff89357336a4606d78b91d076154328fd4a28c222e789939c87b1a783992d47498c526d7e4969d10aceea0b0fc95aebd1960af17999b5eeb89f073e30a4c1c7c7b54d125367220adfae256cdb2d314d5f05a1280ca6341cb122cec18911b5538863d8f087b3e54280b39b1be977d294f80c20b1d6d7df32b51b5f07e9c16f647e522254a48ac4338e4b88b736ca06b1c3b3492269320c8a3985bbe70a5272848fbcedf5cbedc7d108075a78383bae7655ce04a442613c1b1bea1e32a96045655d974e01d92b7e865a492d2d9b93a3134a4d02e2405c0d355cfbeaaed6dcf106f73b5f99fb6bc936503a115ce807611e647460ca7282902d0116329dece87139193d4e1272d103533d97a90195ca4ba0f68a4a8936c85a19bdbf4b5494f850b7d13b804983e529fd9e6a70cf7ac7cd212fb818c4d11ac3fe75cfd35b275a5177c4fefc4fb561b0ff72e4b6ed6bf0e1cd372fd6b5cf1a317615da3b5b3527041e2bb32e24dc2616c00f70859f183ef14ce309d33bf6f646f357db785506aa029be90efb3bd1c2c9f7f9fd954256020d05d6f897a7013a0bc11e1d2e0bad6bff2d9df1565abc620fc82bdbbba73fb3d77e598169f3351b234472889949826e4be2bf040beb6eef4d4c2787a0a99d3fd5245c074eddd6f17d36ec919d4e77127bcff0262bfcf369a66ede9d403be54ea48ddd2ceb15bcc9ad4592f120493b67b48075af1b5426bca548c38c1e45d6160e77bff79598223eb1081ae705c93407e47dccb0571bca24298b807700892e5fba230c3ecff8de886403dd57a14abc36985317f6d9f4448cdbe4f008d32a8889327ce7454b1aee46ef989408d2261f7b04a1c5ca770a2005211901b7baa170885001684485510c55c9a357b118093845864ad93577518550c741b241d6882e6195d431f40064c587a18297013bc5f727d9d4cb240afb1e2334db7f3389f938eeb95e334f296300e07eb0faeaad44c8e5076fe23281e1b71a5da3f81da472c154f333fedfc5d2c34e220257868f9a7b0c9443868e6be368ab24fb827548c4088dc44f834958952effe3efe48a744a8e67c3243acb22b703749ab54cfd695884d9ee0a5e8a535db552c7c132d1beb7b61b8b6c0efe097ec390c51b513814a16ce71b3ecacf929777c75986776b25d7561f56b15e5bd8cb6497bec43deeb499522d44fcd788b14c86d4b9ed0b3296b01309b25baa3557bdebe19a2d303d0a67f06b1c0b3c1043bdc28a1eeed84d0c4fa9c130313cf88e09363653581dd88082d0f566b602e20a486c495f4d1195acfdd28fe95ad33e33b5d6868724674dee97b6d8e500f491e9ca154fa95ab5ba9ebf203d0cd5016163f58917b08e217089b583ba31fa69c57e78e7fe1db58f6072ab1cc3f0ec32ea0b97a58d461bffecd8d5ac88027b4c1e257d1d647c3318a080f63007bb6230d99414f72ec80fbba021b3fe65d62cb5a4ce57d226b91d4de636ebc6c0cc9d1e5a75b24d029eff48e38b5bf78b3fe7634dcbd06030d7a1acee869bb3e8a71b64e6cc85f11e262823b7a70b15fa9d23ee4971858501ed51b55e37e00106bdcaabe2dce7f92c2d7d6919887cd6217162534fcd89fcace9b50446064e6fe4e8d8bb832c0dd1fc059f65d8d62a9f63f44c600ce15c81aa3a20bfcf134cb979588eacdce65ed5382e4f45e4c0258714fcc0901e4911fcc62f1b2d39740e02bb8abacb7bac19cf3668ab02606c0f37803e652986b2705b42bb084f3989c1fb1a050b3fd116f3d9bf3fdff765e8911ca2a822d0435ed12f570fdd1d2ba2cffd765cddaf47193390524feb7692a9b9d4e955fea15a4c94f565dfb2fa58f4fa9905c5c86f379675722fdaa12ae2590840ca04bb7cd43d38f06f04f685c88e06589bdec665df21348b953c6a26e5a28f2988282a54cd8beb85e4fe1ab2a8022562e92ed7ff010074fa1fc72a4f2eb6bcb9ef110c54ff40923ac0fd505f17d13e88618d70606cce912ab1b83aed18e763258b23a3a84e2a93d52b827d0a8bb02c49f61542a848c855f4406e780f6458756a0e7620076e296d238f252971eca4e32f4960a6f5f7dc34f396e36f48379164691eb6b6cb0f297e93ee1530e81eb005d077b17b5da79ff8b6aeaac8d0dfbc6ac761c007fd4a29833d38fc51659463bb10f60d7b5113f93567a67b672b0bb369a8e277516f89112e8349bcf5a61551d9f6d1ce6750055fc5acb5f40123741e78b4cb002f8dddb08e638fe55a11ad9d75cc31a647a5887bd2b6367af4d35eae2a8e6b171ae49b4c4e98f7d8451aa7dbe296d4fa6903f8d2730a5de4b9cae45bf08b4915e47cbd68d2abb33d0500761a7d8d868c2f56caa18d94d9c03633da73d8b9c848f0be3c3d2ed20263552963b4ab4bcc96889a64d42ba1fb53b634a186c626e729f39c19ce4d67d19223d64754598c27c91212d446229950fc8e42fa598b04a0bbc3e6c371c8d1ed4be7a55e76014941f77249e71cfb7a997d7b19ce495f79c4b421784f041192f0cf5a87f41c75d41fe07ce4d398fecb5b88423635c9fad01db6ad99aa25f5fb86b1a8909f19c625239d42cd0b92e054ebe4cf660224995a2546e7ee1285bb1867be334aad361982b9d6300094c19a3da35fdcbffa3eaa187464868b04699b39b6139820861eaba0eb38b661fdceeca0d8e34ee7c461b0dbecc39bc3409dd7e8ea00df02bfdef5064101751c1322db02766457f7698e5b378241f90383f3a1fca9d0460eb1e0cc64988ebecfef60c8c40e6c8a4adbf2de3373f6fb4616506a00a016065e36c6f9bf55cf19049c9ec86d2f0bd1528cf41e389d241e01536680e386a14ba61438e1ec82112c20a554ac7a9a1839009cb19b8c6cf5afc0747ae226fd168806c9fa83459f175c6a409508520168decee06986744a3ff7db0e40cc8de0850a3eeb18e93440b4bc9565df299ceee609d0320372e4dbea5851e68a36ce7a1cdcde1607f5011ba0949f8e0b3c59b3308f0307080d7b52b1c38a2a17fec339f4c56113b55fa025ffb59a7439c141b51d3ea3e3efc78e283c984f731c42265dde895439ae58929a4423a123164a8ddcfb2453213883b006708f42dc91965ae7c075f584df4a9cedc9f7717f66b9e877aea394acec7f277bb3634a1c3e09b09c53872216be99a32decfae418996ab7f559e0eaba375232d53a3bc66d7f3a7b9a241c576d0a8194b4cc8ae8b2e10b5ab3bce52619ece2aa2582df586dd436aeedef31acb5380d6822f58014a4902ced8aa35b298d90117a7f92b376289dfcd9f4353f161339f5ae4d5c42dc2120da1d7a6ec80498662d89f0049b70173ea106e8c69b5856335cc4dc5e344f6ee1f4d04bf5269b176581c9c53d28d3a39fae2d290dc8831f7cec1d6bcfa6a71328d35a4b8c3b0b2b0e956d66c3896fc07a3558035dbdddbdaa04eb2b6af9a3e263713e0b1d348b78c3088dd972323626de2eb23c0035d1993acb3d964671241466df39bab47070343ef7cef16444fbeb1a90700c1fcf39b3488d6a5032155118f8ded293db4b4b83c78a7676b9a04b81e07244b8d46c90c9af3da3445a565ef93871a0dff22b75d5b84203d6bdc01edc64ddb52af9cba716d6518b28e452ceb92698351b682a1daf837b716f2e4ba6650ea0cd03910191f0875f773988975004e0fb1bd5c587cc1a217282d25b6da632a21450cec604dc3d7a42bfab1c2540d4b3b93b2f11d72809e1cfc9ca8c1ea8ca5118f1f6c3fbf085aaab10d121976978abf1bf85f7cca8fca5f1265d539aa4e7dfb6c3df45cb16141442d6121358ff3eea07144e0d3defd1308ee0d573bce02e1921fb5ae7fb4a937dd4142e6e11b0415327d1e2cb133ce996b61dff5", 0x1000}, {&(0x7f00000020c0)="c032a193e7025943593df1dbeb70ec935ac5c459d3ab3a3297ad6b596f871987d5b2f3ca11d3f84e9ec5a14ca9a6ac351cc7e4f3fed278dc94d6f4413d3ad22e08f93696155f7b04520453fddce3f3f85965d4553de9e6893860dcd3e9c2e6efcb2d73498929a40cc3936996e5a12543fcfc6a626e48bbbc952ca24a1755ef4cf3f6c954fe21cf4c69bb6275f6d3410874e0cd81da3ec2ec9102478328a7493150b52972a60ce9c601759f2bf4a90b348e73e93a", 0xb4}], 0x3, &(0x7f0000002340)=[@rights={{0x30, 0x1, 0x1, [r36, 0xffffffffffffffff, r37, r38, r13, r18, r39, 0xffffffffffffffff]}}], 0x30, 0x40}, {&(0x7f0000002380)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002680)=[{&(0x7f0000002400)="07eaa5f75beb0b8947af58a94f7b189bfb94e1de1c62be", 0x17}, {&(0x7f0000002440)="6a422ca1a5a26065955231851b110e05dff53fd3767db957b1fd3de2e0846bfbd530ea59444a2148f7a8375455b06f60e7ef7c4483d40e04c977b67e2ad18af9cd52f8c1085650337c1d95b02f52aab4d5c85492db9bd407e0f547e6e1fdb98b910faf105b1e9b44224a6d3fe00d01e5ea34ad4acb0f2915bbb7c8127f155752699e046626dfa12bbf7377377ddcef1596f000e6823f71b2001c2016f75e2e7cfe75da28d7ceb14d031ec7208bd5b3618cad8a0ba5151af0648ac643ad8aafc0175784ae8b38ae33cbb508f9f74e59113593a4745b95a8f326cd12ae9a1dc1f4b75dd80ca6d1de9e41235304c262bf69891b8bd1", 0xf4}, {&(0x7f0000002540)="2617572a298477ea27a5f4b4033c4b3c8f7ce43760bcfce5aadfda2fbffb6a67b939418d631dc87c6875670ec6a92870846984f68c80a626b8a47bdd1f750b2f1546c92014e82ba4b19d21c1ab4d7d0aa41928f2bad12f2487d6b146f11a6d2ba57066041ee8902e7d9e98af445e090e1d90099954aa75664f713235f20d5888fdb26a052ad50caf4cfc4024fa3ec1d97d14dc8614", 0x95}, {&(0x7f0000002600)="cc493de00ddb06ac2306fd3564c97f24723d3d3931373868e4580d05e6186dfd5a70a8800fb64bb7eba222f75f2bfc275d99d6298a82fd74793cb668c472d3cd97ea1a54420aab0bc05c405b3fbd113387bd0fcaa8525ba4a7a1bc2654e17a7375e45390952fd568bca658547e0515dd547dfe36e1d015", 0x77}], 0x4, 0x0, 0x0, 0x4040000}, {&(0x7f00000026c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003800)=[{&(0x7f0000002740)="604723f6abb061edeac8a23604289e727f2c4e8593bb1522c30f7b0ba74960287183f7377df6d50ca2b52c9d30dafd5bec9dda474911eb83368bb0ae9f248ec90352eb937bd2c1f8a1ec2030f7960e72dd6c25c11861bf1bceeb7ad816703b805b8b7a3d2ea080a6eabe5bda446d973b7884a7ce4cc6a2f5ca5bb1e60635451e42fee8632b3929419bad65b67334fa3b91d015cd0b3f48d9a0f4e7e3d1f88e6920b9dc2e528fda350f62d86d2de112924721f599ac122f3104c8e8d9c92537", 0xbf}, {&(0x7f0000002800)="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", 0x1000}], 0x2, 0x0, 0x0, 0x24000000}, {&(0x7f0000003840)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004c00)=[{&(0x7f00000038c0)="9202da585f17aad5c6550ce43f0af4d0ec88f4d221d223af907da5cd526f4d8706df70758eb5d3d9efbfc37f659c58bb9c3b02ff5e648d224a07a19c1bbfa9ff0722b3", 0x43}, {&(0x7f0000005040)="6249fd6e85cee486195264d033d2ed8be30d494cc9e2ecf72dda1c7bf704b3b050ffc5924017e6de83a937bbe27d11ebaab77ac78f3b156b2bf897836e5e0bd900825aad628e56dc83d0e9be0b895e6f0704ed7f896b4da55886b6d1eeae112df2fe04edac2c362f9bfb7496f319d6f1e4023467ed19aac6fe93307d71682d9cd369177b2c2717d666adfd6d3570e10c73521942610813b362b3c4273feb8d700c20ae9cf73d8e85f75235f7b6cb4da1b1154424f7db5724fea5", 0xba}, {&(0x7f0000003980)="6296252049adcffeb7b0b5c2ad1d73712c199f09e9f789da57dbd876e1f7189c0d15c943ea03483e4549f3038baf8d5ed52c124c727f92861c1f5a03b344dc931172eb4a1c97022abfefbd46bd1675aaa7a50ba17d31c616d9630e0fc513a2c80014e2228652fdbe4d3e3138d0c922af0a20912cff1c71f14f1bb6d5d6b1858b117e57bd24fb1d759ca2c12cf75df1ab0092d596926bc1f179864674a2dc850f9c559ec555c93ca5eac5ae7f5ee53fd0b686895b0beaa8ac986fb63763502f5428c8822830628566cf98158ff04be92604170c263689acc38209663425cf9b6c95836684c84110fc5ace80abc87c25d03d3e7e6fe8a947bce4e983e735dd2a3fdef71a956a4d2e316fb9f53c7de637623785fcec37f157d82bd313d3be7239c6ba40d6c1aadabc522e4d35b6232816cd5b30fbb3f788820420c3d18fec9fa6a66187e207fe208445972789365c4c31763e307a301d0fa40567032b06745fa0e021c2dd1eae007133a0e2534fe00f4d4889e2d53121d79090324147ae1f4388e55de841d32180c66540f3461e7c6ce1abe80c6803c3fdb3771e2ef6c5180dfa28d5fc9864eaf9ee2600548e969dbc21fd81594b2f6ef63ac55160c0ca1d2c2ce822d02569c8bab0c2bae9580d6ce4acdb531e509bd9b3c37fc086f26fb2f5bff7df92e6be9660a277eaa3faf06138ebeb5524ca14a790b123a1ef10403f5150e952a377a9cf767f1c981da71b44c7903b1a07f7f4c6aee0310cc8190ce652ac8c6f1bc507e008dde0cdfdf4e5f66d03b66c8893460e31e09cc2a4dcea8afc18d590da96970cb324be072021361c0fe9ad47fea2a2b1fd28a7f9b5dd84999947940d6450c3deed0e5bb61cc6d924e8d1cdfac1cbc61537dac80f78583446f9ac5b5e5225bf346915d5d92645d35eaca25e126f34b453b307e3849bf7fa635800f31dd457849bc6277267dc74b3dc8db7a2cee09e1695b110c78a0e6453a93f852112637cd2826bb487038298919340dc3608b3fd248639ab00de70be2fbff16fbd59abdc7597f7295f2181b3e9cca3a1c08ab428782a58511bfe30189dcce7478841f4e91fdde4369ce9506f6e257e22066fdbfe83937822178c4e550a6c741bb9049d3027574c15afc922580957d079b1a37b42fc918ccc60e933311ab591da993ad30c5b881e2e3b6b434fa467afcd55130e4a7e41546f08a88a075613474ec7a562930df0df2f9761eef25a6bd0fc7e1a095188b536c5392ecaef844c5daf8c0ed08276a1d28a0915442f7b5d5dc7088b5a061d48b66e3599abb53272045303e5f47732d4d8f99e0a0ed1534695cf3f23970475943fcb8f7693e3e9137c6ed964abfe4c1607e4b1a9dd5d4463f6880e03e7949da912fce7c94a31b8d41c25391e4a871ea44d9fecf4248f3b9ba09c57cac1af9f724b6f478e1847cbf6c7cc76bc23191372187f51708dc6b55aede5c8e18c24581618a987fca91a8d9b516744d79445c63e443adc01e45bc1ef184f6fd8553809db1accd535bb910aff16c75844893ad95c3304b604e4239352a17d2fbd04e7b4ec3a42cf2b7b838ff5b7981ff88ab71af5c17007264fa64b1ea48268cf9d575abbd0103b607afad9ad175c6b9adf1131919216933723b0e6f14f141b14a11791a7826f4dadf22eb978753257e321f213d06c747656bbe1d2415bb29b0287972930fd80f254e8926aed8d29dca4745be262a29b81ac3c6d08d1e44a699a30721484f1cff32a0112a43e1052e76128a7c907bfe8d60e0f1d9065777a37a953fedad2ab302487eb1ff2949c93ba2b21464a659abdd72402cb2359ae6a9b575b39afc483e00960d4e070f5df0ff72c5d5ea6c4cba0ad0a953baecd77886ff7d4b8cc00e944184dc0131ab25ed5a81ab4cad001047aed57e9a55eaea0d7520d6d026531ad4f02e71c81f07a9929be24a724c59822d72b209beaa90d17be08fbf70e4b9217d8fc567b5a12c0395e8705ffc5aea7d07fda5db88452a926c900e7dcdba2be5df300c7693d6677cce84eee21fc9fafd5bddb90fd96966946cb45662da0336740751c005d12f519902358fd969487095f94e1e04742fd3ae90c43e6f5fd101928dcc94c9cc1b9658171583a1da614e70efbe538597d6f010518dd416846ef7f75f48181c4418f94b87b602c2186d3b3cb4a3b32593e668863dcb7523096da8a3129346b08ebdfa0c887cf4655a750b6a93489e6bd1944677eee12dfc1fa08b9c1b26af83b4d0fcaf2b0a7ba7ff25d199fd5383ddcfbafbb4fb69f6aca543d1b704c08069eb49b267a1794752780747eb1febf8fadd2dcde60620a4a48ff3bdd42a9d3d53a2885fb745c959c40be4c90ccf4dae1b23c492a0fa936dd3e09a0c873a6b595efc28369717f0d8a22b537d6c214f7e4ebfc8f07f4fba653d5d5e9d9f2a5e956148c8c4d0165c4d01e4895f5d8489b6ca6a930999cf8f3f555f05057199af55bdb20f0159754a623f7268fa32fbb13ecfc82b309799c85f951ae4e96565ba8d86713f6e5335dfbff347c175cf4eb4a3c639683eb47537de7c34ab6d033be9e23c5c32cf4b140802cad13f87d25b3d571d810bdc4ea312200b96a2c42869d5e8bf9625755b966503b868a01c7a197c17915cbb287452a5afab85ac5094ac45d245ccf904c4e0ae2c1b015bad7d948700ad2c20e4991156eefafd644f75eba5e93701dc8bced588e67a9eec4067eefb36910e9f5fc84e45469550dbe36d5e5419af4cdefa7ffb8c4eaa70f0aa44361fd9f3a4d702440c48d7a8c87e7e525c5fb1466db772830b2204d779b6e0bb01dc58441bd9aa40c0a61bbde6adaadced59e17c6b8696af824fef2ba039821d7f3f8addf2dca17df983c82ff9ae5ec962f827c2a62f97ff2c88ba6f6f05e245432eca66ffd7c3cb079c3299f68e357d111eca84f58b0130e9f51137c4b531665159ee566c2fe1500f5267529bd2c205aefff713291763e35426b40a6cd513b3d6cd5b80969645d6e96a7b981750a77bc231985bba5606a02a5577b808b0d905485f6b662c257f428055c12578b9feb010eb379f6b163d6d1615cc497ff8ced2ce8a11cacb58546aa00375062b2a785b8e9e8efb620b3e8ad2b9ed35cb3265e0c0e221e95a4883f5d9f228e3ee52a7bf04b679c53d674eb3bd439b4fa010698e3e454a8e742bad78a3afd684db379b1b584f200acc6b90f01a1a6a27a2bfaa7a1a8b651530fe379132e013dfc5acc0bc78d89e77063963c97ec225e383670a7008e136d79b969ee7b981b617cdfca50ca3d890033fb4b7ea27449e172345dbca06d7d93517ff24d0c0195a604cda26db15a707a0657d8966aa6181e9cb8605bdc6ddbfbf3e59befdbbb3cbdeef564a896e6443cccff4e98ba6a95dc3599d2ff6307607c1c3e90a7be7f8d1ac5375b414ff2a9bc7a8eb70934a83109265008c59fd77f8b89b3764e08f361162ec341128a8a739a7f040a3eacfb3bbedb6479491d7a62fdbb69a7f8120726572d22bd702369327fee26f0d7494060d2a4f9bd04c36156395e62200600a9c3e98a3ff865524277c5c6affea83019a2a75711b9f7a169ed02e9a1c33df4550bfcaf3961d08de342ab1e43b7e231d818a94d06fe0f6cc42cc435e187d6002467aee61f1b956cfca27a49f0e299a19be593fcebeb7b6d8fc2cabecea057880430284c4de12b923e84444cbbe9ea720bf450aa9cee7a61a90750a7d06eb72ea62917b882a5f78a5fea055eed658db8666232ad4d19b8db838cb33a493cff117d94354419f1a3104fafafd4cc519f470f920966194dc056eed8107f78a4b7fe5b1e5bc6527162b49f49b21dfff2ab91733307e480fe7f7f60437c03e36178d554b5bd34e6db366c36ff1ea31bd4a99e6983a7e23bb311f6191f9442451a18dca552b85d44e5be1276da4ceac238f1675d6d5be9172c244df35f247a4cf6a9a8676a0459ff9771e08958a4239d897169932968b0d6986edeb002d84fa78215825366578f7881ef5bd361809aaaccc2ab3ad962afecb7ff7ac1a58abc03c86cd49e033346759ca0ff60906e9077dda1f82fa6ab5446f583d34990d8542f34fd187448f0aa77a7b607ea9077b43e0d05a45005614e2929a6859ecc64bfc7dbe026d3c8de12789de3f66483c0af85c7de745b5f0669a1d691118ee2012fc71a5ea1ddb597d70886fe1ac768de67570f0e5e177abb1427ae4ed0909b3d98b8efcd67cd3022fc48299565c39d0f7c527c1be36b30ea5706e53f3dcdb21b5d34c392282b8448de3e7d0203a0d59a23f94e4ec10eaf78086609849692016400611041e5c8739c1e2b2ab7afc18edf28858aa3a5e4254669d348b4eb4386130dca969c798fea568a6d46bbd7102ff0fe407ecc55e2260a504c7c4450b10cbfe2bbb0cd6c6e2364a1a8520942f1866c39bbabf88676465b44ff6d3d09ed637a1054b5d1f7042c55e4b616826715f4ae1c0b1265d5311d95f7a986147b34aec6583b140e2a0bffeb816abe96a227191655a1617c7b0c66c5c9fdf30b73b82e428e4fdc50e2a583ab534bcc68cf96d32fbc18b18c69952d6033c683e7a822170fafd50f3db5872f323db91e39adbb96f92afd46a734c900de6f16010418f176d759b8518d9977a0740448aaf68eed7c87e8afd40aa2bb35ea622cffd3f0dcb05413c7b04daae06a76cb7ac9be23df441f63f30da1b519d0571d1daaa917f33e92c389fe5ff85aa25a2c4409b5eaeb622a2fe2733406fc37cd923d7e3dd5f7a5723618585b71a89a844e350b8fbb2afef7821bac172adac90c7bcecd9ffda21601b830655460f17ba05adc714ec6629286179ac51e64206cdc2b7d24f53269ee44569e2194b93c88ac0e7899e2e7dcb4497025febf48036eaed8386a385847b1d51a1e0e351b7f3fad3a669df36c0327bfba6bf1d5808950d8f248cea0b1606f275ef116ca01b185d8d7db7c8ad2399acb4ebcdbb38ebae97e5b6760a3d77a1f56c006dd6d7bfda712570df9f7689cb1255c2197c5e9f97d0a16dad9bb8571eeab4e030d75e858520cf3e82a1a9b58ba18ac22d60e65249b7e9d79c89a4fbf1cdcd853c1746ee53bcda046b20f6cb403bae43fa5e1cb2844f960128446839d07bf5ff2749c5f8b45150b0f3f82ddaa91c86c85671a692020a3eb58baa121bd8eff58925c92e09e77e837a5857c618c813e8642d30a388637e473a3905d914d76a050ae373eae4f77f74a7238fb05625aec84d46a7676e047d9f98abde993f49c970421f26b2e6c680f572a42ad2adfb4eb91c51695ab62da84aca8a3a7e0cf7e38136f3de8d9acdf358e09cb36b5a60f8b337057ecfb1e477d815eeff7be81fff20762ca05bf8da66ae81afe03cbf09074f721835879e2c271104a196cb097de407539717a6a6da5d155e242a95258a0abc40090760a15b886d276d0d23cb3686aeebb608c969457d938bcb27556e5b847d91ffbf63d6fc4abe3a14acb01e38c5c7335cd3e586b9d48410a0912340024ef6e33fd16579576a7420be3305e8effa4901dd212fad396ec1db417de8165dcf2f2653311abb0f59405e14f9d6f9f1e44c884a2cb64dae064297d597b48f478a682c4e23d3be51c0934c9b00df3aad59005dd30dc1e1164960f0419791491ec1eb2b1391c45f879e4dd24ca404f40e06c1bf6197786260235601df6690a735696d2d98ea20845890ab2b2fefe9fa3ea652a5404112984cb55f51b40d7d473cb7017062213092d3c7ea35353564b7dc6aa9205579fd8b98ffcd7ad3d8570d85699ac670ef204ba45", 0x1000}, {&(0x7f0000004980)="82f309c280ff9ddbca912890ed8f614f01a30cd67fb627c96fee478012b34098608af075", 0x24}, {&(0x7f00000049c0)="b78c77f3e5811bb8dd99b368b309e87d0bfbb638d575b4221ac68e8422ac73f27ba8e56ea9a169906c257e8819a6acc7672c373695523465e64f669d9d42b446b3daa2f7e77d96dbb8f1bb5172", 0x4d}, {&(0x7f0000004a40)="6d656df4a9d34176adc4dc184fb3d798f66042c880fb2819744b8eb8857341156df79afd3fb44fefcaa63b36a29045b00f4319bbbde1b08963a02bccd07f66afef0151fdbd0b76d8f07b88b78113a64409183cf27f3cd37deaae0461f9906f3a94cb7bf1705dc5e0b304d4cb710acf910a71517f713d93a9e5007d35ff695870a99a0201", 0x84}, {&(0x7f0000004b00)="a57b551e55ee106a08e950e79ee3f0d3a1e55a3899184db36ff4c8c5b0700d6fee5147bf240bc98619f2ce2e7cedeafbcd3f9b2b7b81ea339bd110", 0x3b}, {&(0x7f0000004b40)="569266d24a494a46f37f21ef866523dda7cb9765c319e725ce717382f2b3fb273074e0603f6132f184956827f3c2cc8e6f8af1175ca54c56e51cd342a91711bc9261372584f29fddcfce3951acbed992f2154c7fc0f8dd3d3f220a960db7d73f273d33fda5aa1cb72a045ee77ff26e942bd20406a827a0129583abe421efc9b051e692d90010cbeb1547eb52ba652cde2134f3326bc37c2f27956b274753220e89719c2df7a1af3689954d6a71ea8c55076dcafa2c", 0xb5}], 0x8, &(0x7f0000004dc0)=[@cred={{0x1c, 0x1, 0x2, {r40, r15, r42}}}, @rights={{0x14, 0x1, 0x1, [r43]}}, @cred={{0x1c, 0x1, 0x2, {r47, r49, r16}}}, @rights={{0x30, 0x1, 0x1, [r50, r37, r33, r51, r10, 0xffffffffffffffff, r52, r56]}}, @rights={{0x30, 0x1, 0x1, [r57, r12, r58, r59, r34, r10, r17, r60]}}, @cred={{0x1c, 0x1, 0x2, {r62, r14, r64}}}, @rights={{0x1c, 0x1, 0x1, [r35, r33, r65]}}, @cred={{0x1c, 0x1, 0x2, {r3, r29, r24}}}], 0x118, 0x40408a1}], 0x5, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r66 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r66, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r6) 00:22:49 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, 0x0) 00:22:49 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x84982, 0x0) ioctl$VIDIOC_G_CROP(r1, 0xc014563b, &(0x7f0000000080)={0x1ba1053f28db1384, {0x4, 0x9, 0x3f, 0x7}}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 374.688954] input: syz1 as /devices/virtual/input/input34 00:22:49 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, 0x0) [ 374.892572] hfsplus: gid requires an argument [ 374.897112] hfsplus: unable to parse mount options [ 375.009906] hfsplus: gid requires an argument [ 375.014707] hfsplus: unable to parse mount options [ 375.055486] hfsplus: gid requires an argument [ 375.064508] hfsplus: unable to parse mount options 00:22:50 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) getsockopt$packet_buf(r3, 0x107, 0x2, &(0x7f00000014c0)=""/4096, &(0x7f00000024c0)=0x1000) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r1, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000002580)={0x0}, 0x1, 0x0, 0x0, 0x4008840}, 0x84) getsockopt$sock_linger(r5, 0x1, 0xd, 0x0, 0x0) sendmmsg$unix(r5, &(0x7f0000001480)=[{&(0x7f0000000040)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001400)=[{&(0x7f00000000c0)="3cfaf2a4236261d8021ba8d87fcd78468bc76cf118e6b985055048080f3564da10b90df6c35bea052cdc572a547f956970e96b4f03003e331fca8660548ec687ac7ff618350b7f63860f78c22d4fd2bfe82264c9e446b6", 0x57}, {&(0x7f0000000140)="056974b2f343accdf3ce929681d70adbad2e573e7c4c96d4e2dec48169911a37386193f957fd175533ff13f1d138e5ab31fa89f33c2cfabb8ad216dae9bc0865e624e20697f8ff8e3d2f6fc9e3e87f924104643af9462b6a3f036c06c18f12796221b2b11c974c9d19d39e0aa1b3c0058c10ffa49ddf33cb77cc0ad66631cb7d2124dc394010946687f3289cd2a7062613654aaf335fb5a11688746b8068a0bfd506da5c8a0eafbb22a514eb2536a13272e48803d1fb4c5fe466c20084423af25a44c9811d0b9f644967f89478e7a5a597d0ce77e6163d7cba6b", 0xda}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="cc505672a172743114", 0x9}, {&(0x7f0000001280)="b6cfc1003f0619a7f6e557d8d5833ff010f20bef31c34ba10c7c4691c19c2c01096262585b6d06f0479bdc844c1ca5f760183349319128d49db4846aa7afcb4343ab", 0x42}, {&(0x7f0000001300)="1a8c1946eaf4edb8fa9b7fe42c72f52605b511b0c497d3f981b5b9ddf4ad9bfa5f0b8ad62d4f30d7c72f1a38845429eecaef1f350149d0e2230713b045c4b67de15ce2b46afe6ca42c58087194ef5dc94c3ac5ae8d1ec13401844168f30f59f1a6c5b87f45bd30448c2b7fb05fb57a692604e6fcf98bca43c47a4fe06c016c6b9f6d5ea53796d9ce5bc7acb18831ae335426c1d735895665186e8b1d5f9c306ce419a60283c5f0472a1e3c6bfe19ff6590ba040959d8bc3d80814df4ab7aedcf85eaba8999eb00c9ddf898d1b09613a0364841c3d2a297e4186ae8e6", 0xdc}], 0x6, 0x0, 0x0, 0x20000000}], 0x1, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) setsockopt$RDS_CONG_MONITOR(r4, 0x114, 0x6, &(0x7f0000002500), 0x4) 00:22:50 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, 0x0) 00:22:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:50 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) linkat(r2, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x400) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:50 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)) [ 375.199337] audit: type=1400 audit(1580084570.225:69): avc: denied { create } for pid=21285 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 375.283152] hfsplus: gid requires an argument [ 375.288250] hfsplus: unable to parse mount options 00:22:50 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) r10 = dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r10, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) 00:22:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:50 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)) 00:22:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:50 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/udplite\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r5, &(0x7f0000001fc0)=[{{&(0x7f0000000000)={0x2, 0x4e25, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000040)}}], 0x1, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:50 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$SNDCTL_DSP_CHANNELS(r0, 0xc0045006, &(0x7f0000000080)) 00:22:50 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) r3 = syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x0) ioctl$KVM_GET_XSAVE(r3, 0x9000aea4, &(0x7f0000000880)) write$uinput_user_dev(r2, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r2, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000080)={0x9, 0x5, 0x4, 0x2000, 0x4, {0x0, 0x2710}, {0x4, 0x9, 0x8, 0x1f, 0x9, 0x3f, "1d4eb98d"}, 0x8000, 0x0, @fd=r3, 0x2, 0x0, r4}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT64(r8, 0xc0984124, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}) ioctl$SNDCTL_DSP_GETBLKSIZE(r5, 0xc0045004, &(0x7f0000000000)) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:51 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r5}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) r6 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r7}}]}) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000080)={0xa0, 0x0, 0x4, {{0x6, 0x3, 0x5, 0xfd, 0xfffff801, 0x3, {0x0, 0x2, 0x39, 0x100, 0x4042d636, 0xc3d, 0x7, 0xe6, 0xbd9a, 0x10001, 0x1, r5, r7, 0x0, 0x5}}, {0x0, 0x8}}}, 0xa0) 00:22:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) [ 376.111559] input: syz1 as /devices/virtual/input/input38 00:22:51 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r9, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) 00:22:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 2: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r10}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0xffffffff, {r7}, {r10}, 0x2}) r12 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r12, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f0000000600)={'batadv_slave_1\x00', 0x0}) statx(r0, &(0x7f0000000640)='./file0\x00', 0x100, 0x2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r6, &(0x7f0000000b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000780)=@delpolicy={0x314, 0x14, 0x400, 0x70bd27, 0x25dfdbfb, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote, 0x4e24, 0x101, 0x4e21, 0x2, 0xa, 0x40, 0x20, 0x3c, 0x0, r8}, 0x6e6bb8, 0x1}, [@user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0xa}}, @algo_aead={0x11a, 0x12, {{'aegis128-aesni\x00'}, 0x670, 0xe0, "59aa2af643e0d66dda97b918d79ede6f13369743c875056db68f3c3f7b7d546ceb05a3848f63ad80e54ef00012c3c6079c8fe0235d7b409ea2dc97e9ccd6217ed46598368b244c6b574e2db7198610bd05dee7362013201bbd26580bc7ba80fefba68c240f7a46f53af96ae05dbe5b6288f20f35def748bb00ee49314f60c5dd0fa3d9291517e52221e1d49a36d07e4f8447199a830316dd8cd0a4d5c0fc73346378574a3c3dd70c451611ee6db1fdb12cca58286111f8bb845ee5425725cff5f80cbfa7b43611341c78effb6525"}}, @etimer_thresh={0x8, 0xc, 0x400}, @policy={0xac, 0x7, {{@in=@remote, @in6=@local, 0x4e20, 0x100, 0x4e23, 0x7, 0x2, 0x20, 0xa0, 0x2, 0x0, r11}, {0x400, 0x7, 0xfffffffffffffff8, 0xfffffffffffffbff, 0x7a, 0xfff, 0x0, 0x80}, {0x80000000, 0x1, 0x1ff, 0x4}, 0x5, 0x6e6bbf, 0x2, 0x1, 0x1, 0x2}}, @srcaddr={0x14, 0xd, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @policy={0xac, 0x7, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2f}}, @in=@dev={0xac, 0x14, 0x14, 0x3e}, 0x4e22, 0x81, 0x4e23, 0x6, 0x2, 0x0, 0x20, 0x0, r13, r14}, {0x9, 0x1ff, 0x3, 0x401, 0x2bf7, 0x3, 0x8, 0x4}, {0x80000000, 0x1f, 0x4, 0x7}, 0x2a09, 0x6e6bb7, 0x2, 0x0, 0x2, 0x2}}, @etimer_thresh={0x8, 0xc, 0x5}]}, 0x314}, 0x1, 0x0, 0x0, 0x4060085}, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xd3) r15 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r15, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r3) [ 376.262572] hfsplus: gid requires an argument [ 376.268393] hfsplus: unable to parse mount options 00:22:51 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000001840)='/dev/sequencer2\x00', 0x202800, 0x0) ioctl$ASHMEM_SET_SIZE(r5, 0x40087703, 0x4) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000017c0)=[{&(0x7f0000000480)="4ba09fb94766b765a551771592ab6407c3c8096e20757a8b1777b2a94c5805ea7c226ac9b7cdda2f7c68aea1e2fd1ac11e8c5e2c41f4e762235a95f460bd759ce53446c6b48f23b15927ad53dfd4a70b96bd8f8cc5ff01565e5f84656d14729505de6c51c5fcb5dd0b5841e636ed70490b355f003d671c187a7fd0b23d6feb0608000e1abcf7ea", 0x87}, {&(0x7f0000000580)="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", 0x1000}, {&(0x7f00000002c0)="d3cf6c4ef4", 0x5}, {&(0x7f0000001580)="f56dfd6782c54ff3b5a7b288366a2e94439275218b2d850db35ba61146b77882de04c91b0661a81b6839c0702fdf302a8251affebd2bac37633f92ab31548d7012af22f8af67c1e29d18d687fa689f6a8708fe466c6dc54a80c4d2836373cea3430673204c32ec33a40880a43d8867817ebbb2eb04f15575dd95df127bcea2f18a21df19e7a42f04c198bc32728d3b", 0x8f}, {&(0x7f0000001640)="c805ef1ae4dec31312b768bf6704a0a3164b3714cabf66ddd2d983dc4a68a084558d5e23250495520e0e8049c67730240fe375b586a83c56f3e18cc3ac0856b56b6317bf1a4442ad302103eb1a28ad9256f0d230db6177ea6aae4060b2cb7099bb46e25d9f038e7b3a00bf1ca5c1c10c6df1ba0d4f179439065df7a39a5e28ff744bee9cfe84ba881a6f738f5ea2254afb21a90540d74de9bdfe8fd9b22d2b662f1e6c623d656a7d551526bc1c281a614f119f7488462c832c77b03fcf993a14345176547be016b8f3447097e531e8274cd169371d08089e55fc09a1", 0xdc}, {&(0x7f0000001740)="22e7ed113c86acaa343576a81cfe1a6aba95d0939ac6646c69005e50929aa789e7d2a844d400d36927b1c93516820da5590ad9c76a0f938c8656c208299ffebe644b9dfa4b44ab75f949bd03e3c764f35165bdfeaa82dbc307bfd0065edccd5ca5961755b187d9a81e6a7c48f54c4868ef60b38e7618197baa6208a7b2c7", 0x7e}], 0x6, 0x0, 0x0, 0x40}, 0x0) 00:22:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_PROTOCOLS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x3c, r1, 0x820, 0x70bd2b, 0x25dfdbff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x29}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @multicast2}, @NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x2}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000080)='NLBL_MGMT\x00') r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 5: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) 00:22:51 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) 00:22:52 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x8901, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = fcntl$dupfd(r0, 0x406, r1) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000000)=0xfe6a) 00:22:52 executing program 3: getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, &(0x7f0000000040)) r0 = semget(0x0, 0x1, 0x610) semctl$IPC_SET(r0, 0x0, 0x1, 0x0) semctl$SEM_STAT(r0, 0x0, 0x12, &(0x7f0000000080)=""/87) 00:22:52 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$inet(0x2, 0x4000000805, 0x0) r9 = socket$inet_sctp(0x2, 0x5, 0x84) dup3(r8, r9, 0x0) 00:22:52 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) 00:22:52 executing program 3: semctl$GETALL(0x0, 0x0, 0xd, &(0x7f0000000340)=""/157) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x12000, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r1 = socket$can_raw(0x1d, 0x3, 0x1) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x20000, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000180)=0xfffffffffffffe0b) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e21, 0x3, @empty, 0x8}}}, &(0x7f0000000100)=0x84) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r4, 0x84, 0x1a, &(0x7f0000000280)={r8, 0xb6, "7d001268c65ddd598cf42a1deceba9fc40952225ad60198e34e06a3d5dcbe3678b379ab197ab692e29e846aeecf54cdc5a40a90c3c07a05fe8a5ab7d4ac85d579f7d43da556ed49bc96a6ab12858212227c1161dd6986c3c477460dc6c53e11c56cfab8994c2da3845b31f01dfba0f6696c778ec76d6bcc18aca6433a31f8d2210130826df1961ed75235beb9341928960dc20c2fcebdd602a455a6761789d626770c0681813bed0937d4a7ba56230a1230538023782"}, &(0x7f0000000140)=0xbe) 00:22:52 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:52 executing program 2: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r10}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0xffffffff, {r7}, {r10}, 0x2}) r12 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r12, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f0000000600)={'batadv_slave_1\x00', 0x0}) statx(r0, &(0x7f0000000640)='./file0\x00', 0x100, 0x2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r6, &(0x7f0000000b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000780)=@delpolicy={0x314, 0x14, 0x400, 0x70bd27, 0x25dfdbfb, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote, 0x4e24, 0x101, 0x4e21, 0x2, 0xa, 0x40, 0x20, 0x3c, 0x0, r8}, 0x6e6bb8, 0x1}, [@user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0xa}}, @algo_aead={0x11a, 0x12, {{'aegis128-aesni\x00'}, 0x670, 0xe0, "59aa2af643e0d66dda97b918d79ede6f13369743c875056db68f3c3f7b7d546ceb05a3848f63ad80e54ef00012c3c6079c8fe0235d7b409ea2dc97e9ccd6217ed46598368b244c6b574e2db7198610bd05dee7362013201bbd26580bc7ba80fefba68c240f7a46f53af96ae05dbe5b6288f20f35def748bb00ee49314f60c5dd0fa3d9291517e52221e1d49a36d07e4f8447199a830316dd8cd0a4d5c0fc73346378574a3c3dd70c451611ee6db1fdb12cca58286111f8bb845ee5425725cff5f80cbfa7b43611341c78effb6525"}}, @etimer_thresh={0x8, 0xc, 0x400}, @policy={0xac, 0x7, {{@in=@remote, @in6=@local, 0x4e20, 0x100, 0x4e23, 0x7, 0x2, 0x20, 0xa0, 0x2, 0x0, r11}, {0x400, 0x7, 0xfffffffffffffff8, 0xfffffffffffffbff, 0x7a, 0xfff, 0x0, 0x80}, {0x80000000, 0x1, 0x1ff, 0x4}, 0x5, 0x6e6bbf, 0x2, 0x1, 0x1, 0x2}}, @srcaddr={0x14, 0xd, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @policy={0xac, 0x7, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2f}}, @in=@dev={0xac, 0x14, 0x14, 0x3e}, 0x4e22, 0x81, 0x4e23, 0x6, 0x2, 0x0, 0x20, 0x0, r13, r14}, {0x9, 0x1ff, 0x3, 0x401, 0x2bf7, 0x3, 0x8, 0x4}, {0x80000000, 0x1f, 0x4, 0x7}, 0x2a09, 0x6e6bb7, 0x2, 0x0, 0x2, 0x2}}, @etimer_thresh={0x8, 0xc, 0x5}]}, 0x314}, 0x1, 0x0, 0x0, 0x4060085}, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xd3) r15 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r15, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r3) 00:22:52 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) 00:22:52 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101002, 0x0) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x7a, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r4, &(0x7f00000000c0)=0x4) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, 0x0, &(0x7f0000000040)) r6 = semget(0x0, 0x1, 0x610) semctl$IPC_SET(r6, 0x0, 0x1, 0x0) r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r9 = dup2(r7, r8) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r9, 0x800443d2, &(0x7f0000000040)={@any=[0x3]}) r10 = socket(0x200000000000011, 0x4000000000080002, 0x0) r11 = socket(0x11, 0x800000003, 0x0) bind(r11, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r11, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r10, &(0x7f0000000000)={0x11, 0x0, r12}, 0x14) sendmmsg(r10, &(0x7f0000000d00), 0x400004e, 0x0) r13 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80001, 0x0) r14 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r13, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40045000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r14, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x23, 0x1, 'selfbdevwlan1selfvmnet0\'md5sum\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x44008) sendmsg$NLBL_MGMT_C_ADDDEF(r10, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="00042dbd7000fbdbdf250400000006000b001a000000080007007f0000011e00010076626f786e6574306d696d655f747970650000001d62477b1853aa2b2f783a5d54f607fd8bde9d9cf78bb5766a88cb8732d12cbb917f81f3c2cb6e2c8aed308418fd782fbb951afee26a9402f986b839127a36f52e377075d8cc22e2e145fa6e7aaecbcafb221f0915821deaf5419bef1968f173858a2a3a4d"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) sendmsg$NLBL_MGMT_C_VERSION(r9, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="020029bd7000ffdbdf310800000008000200050000000800a78e6febfa2920787b142bac98b6a5a65693bf5724d0d2b89e8687de886d01587299f6a809995fbd8a7c7586a0e571e849ba6af509ff78ac5f08eaf3d7cf462aeac61b8f76f64f9ede80e7b1eb11ebf750d2ff1afd000000000000"], 0x34}, 0x1, 0x0, 0x0, 0xc}, 0x24000844) sendmsg$NLBL_MGMT_C_REMOVE(r3, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x34, r14, 0x10, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x2}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @loopback}, @NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @multicast2}]}, 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x400c1) semctl$IPC_INFO(r6, 0x0, 0x3, &(0x7f0000000100)=""/84) 00:22:52 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) 00:22:52 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) 00:22:52 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) [ 377.551998] Unknown ioctl -1070574846 00:22:52 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) 00:22:52 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) 00:22:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) socket$inet(0x2, 0x4000000805, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 00:22:53 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(0xffffffffffffffff, 0x8004552d, &(0x7f0000000180)) 00:22:53 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000006900)='/dev/vcsa#\x00', 0x7fff, 0x40000) ioctl$sock_bt_bnep_BNEPGETCONNLIST(r1, 0x800442d2, &(0x7f0000006980)={0x1, &(0x7f0000006940)=[{0x0, 0x0, 0x0, @remote}]}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) 00:22:53 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, 0x0) 00:22:53 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r2, 0x28, 0x2, &(0x7f0000000000)=0xfff, 0x8) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:53 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_disconnect={0x20}) fcntl$setlease(r3, 0x400, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:53 executing program 2: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r7 = getpid() getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r9, 0x407, 0x0) write(r9, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r10}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$DRM_IOCTL_GET_CLIENT(r1, 0xc0286405, &(0x7f0000000500)={0x3, 0xffffffff, {r7}, {r10}, 0x2}) r12 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r12, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r12, 0x8933, &(0x7f0000000600)={'batadv_slave_1\x00', 0x0}) statx(r0, &(0x7f0000000640)='./file0\x00', 0x100, 0x2, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r6, &(0x7f0000000b00)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000780)=@delpolicy={0x314, 0x14, 0x400, 0x70bd27, 0x25dfdbfb, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@remote, 0x4e24, 0x101, 0x4e21, 0x2, 0xa, 0x40, 0x20, 0x3c, 0x0, r8}, 0x6e6bb8, 0x1}, [@user_kmaddress={0x2c, 0x13, {@in=@local, @in6=@mcast2, 0x0, 0xa}}, @algo_aead={0x11a, 0x12, {{'aegis128-aesni\x00'}, 0x670, 0xe0, "59aa2af643e0d66dda97b918d79ede6f13369743c875056db68f3c3f7b7d546ceb05a3848f63ad80e54ef00012c3c6079c8fe0235d7b409ea2dc97e9ccd6217ed46598368b244c6b574e2db7198610bd05dee7362013201bbd26580bc7ba80fefba68c240f7a46f53af96ae05dbe5b6288f20f35def748bb00ee49314f60c5dd0fa3d9291517e52221e1d49a36d07e4f8447199a830316dd8cd0a4d5c0fc73346378574a3c3dd70c451611ee6db1fdb12cca58286111f8bb845ee5425725cff5f80cbfa7b43611341c78effb6525"}}, @etimer_thresh={0x8, 0xc, 0x400}, @policy={0xac, 0x7, {{@in=@remote, @in6=@local, 0x4e20, 0x100, 0x4e23, 0x7, 0x2, 0x20, 0xa0, 0x2, 0x0, r11}, {0x400, 0x7, 0xfffffffffffffff8, 0xfffffffffffffbff, 0x7a, 0xfff, 0x0, 0x80}, {0x80000000, 0x1, 0x1ff, 0x4}, 0x5, 0x6e6bbf, 0x2, 0x1, 0x1, 0x2}}, @srcaddr={0x14, 0xd, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @policy={0xac, 0x7, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x2f}}, @in=@dev={0xac, 0x14, 0x14, 0x3e}, 0x4e22, 0x81, 0x4e23, 0x6, 0x2, 0x0, 0x20, 0x0, r13, r14}, {0x9, 0x1ff, 0x3, 0x401, 0x2bf7, 0x3, 0x8, 0x4}, {0x80000000, 0x1f, 0x4, 0x7}, 0x2a09, 0x6e6bb7, 0x2, 0x0, 0x2, 0x2}}, @etimer_thresh={0x8, 0xc, 0x5}]}, 0x314}, 0x1, 0x0, 0x0, 0x4060085}, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0xd3) r15 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r15, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r3) 00:22:53 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$EXT4_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000380)=0x40) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f00000002c0)) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r7, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) 00:22:53 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, 0x0) 00:22:53 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r0, 0x8004552d, 0x0) 00:22:53 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 378.689673] Unknown ioctl -1070574846 00:22:53 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) socket$inet(0x2, 0x4000000805, 0x0) 00:22:54 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000002c0)=0x4010, 0x4) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$x25(r6, &(0x7f0000000200)={0x9, @null=' \x00'}, 0x12) sendfile(r4, r5, 0x0, 0x50000000000443) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r5, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0x9, 0x0, 0x4}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000001}, 0x48c91) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r9, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$VIDIOC_DQBUF(r5, 0xc0585611, &(0x7f00000000c0)={0x6b3, 0x5, 0x4, 0x40000, 0x7, {r7, r8/1000+30000}, {0x2, 0x8, 0xfa, 0x8, 0x1f, 0x1, "17df3790"}, 0x3, 0x3, @userptr=0x7, 0x8, 0x0, r9}) ioctl$IOC_PR_PREEMPT_ABORT(r10, 0x401870cc, &(0x7f0000000140)={0xb20, 0x6, 0x9, 0x1f}) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000000)={'vlan1\x00', 0x7fffffff}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:54 executing program 2: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x17, &(0x7f00000002c0), &(0x7f0000000380)=0x4) close(r1) 00:22:54 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x12800, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x400040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r7, 0x65, 0x3, 0x0, &(0x7f0000000000)) 00:22:54 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f00000002c0)=@v1={0x0, @aes128, 0x4, "711eff356c2a1940"}) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:54 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 379.504910] Unknown ioctl -1070574846 00:22:54 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) 00:22:55 executing program 2: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x17, &(0x7f00000002c0), &(0x7f0000000380)=0x4) close(r1) 00:22:55 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000140)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x9, 0x1, 0x4, 0x200000, 0x5, {0x0, 0x7530}, {0x5, 0xc, 0x0, 0x25, 0xb5, 0xff, "9e01426e"}, 0xfffffc2c, 0x3, @offset=0x9, 0xfff, 0x0, r1}) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000000)=0x7, 0x4) 00:22:55 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_PCM_IOCTL_STATUS_EXT32(r2, 0xc06c4124, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) recvfrom$x25(r2, &(0x7f0000000100)=""/140, 0x8c, 0x40010002, &(0x7f00000001c0)={0x9, @remote={[], 0x1}}, 0x12) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r4 = fcntl$getown(r3, 0x9) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x0, 0x4, 0x0, 0x2, r4}) 00:22:55 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_GETMOUSEREPORTING(r1, 0x541c, &(0x7f0000000000)) 00:22:55 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x8}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$char_usb(r5, &(0x7f0000000400)="534be0658152882aff39cb1eafb699c9ae9ca4560248ea07c7013d15514149991e9004f5a469454336a306a9923d46b3a3738727fd78b8464fc47bce01644acef6efc102e2d4ca5968b33f3564630cb5371e8724d2fd7b15c91e05baeeb7764c31f08f326a4c7be8c869a9d0c9a61f9103f9a7ee29eda80f2d35919701894d81eb7e0793b26023e95847692f17f6c6e64cbec111c0508cb704035cec52e7f18472d8eb2051c4a297d7b1f20726e7981bd126164504eff58c9dfb", 0xba) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:55 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:55 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$KDFONTOP_COPY(r1, 0x4b72, &(0x7f0000000480)={0x3, 0x1, 0x1b, 0x1d, 0x70, &(0x7f0000000080)}) sendmsg$can_raw(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000004c0)=@canfd={{}, 0x3d, 0x0, 0x0, 0x0, "130121cb1137cd7adccc3d87ecf9f458b88c6c4c4e842178c8e0e8fdb2a82a836f1f366e07f75b1176cc40b21197df61eaeea4ab9356d5e888c90d4c7bfa62bb"}, 0x48}, 0x1, 0x0, 0x0, 0x810}, 0x4000010) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r3, 0x84, 0xb, &(0x7f00000005c0)={0x6, 0x7, 0x8, 0x8, 0x7, 0x6, 0x5, 0x7f, 0x6, 0x94, 0x8, 0x54, 0xff, 0x80}, 0xe) 00:22:55 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write(r2, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r3}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=rdma,port=0x0000000000004e21,nodevmap,access=any,euid<', @ANYRESDEC=0x0, @ANYBLOB="2c646fc0a43ab86bf46cbf3fdd10df866e745f617070729fde8bb08a50a878643c", @ANYRESDEC=r5, @ANYBLOB=',fowner<', @ANYRESDEC=0x0, @ANYBLOB=',permit_directio,euid<', @ANYRESDEC=0x0, @ANYBLOB=',dont_measure,dont_hash,fowner<', @ANYRESDEC=0x0, @ANYBLOB=',mask=MAY_WRITE,\x00']) stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fstat(r1, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000b40)={{{@in=@multicast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000340)=0xe8) syz_mount_image$iso9660(&(0x7f0000000280)='iso9660\x00', &(0x7f00000002c0)='./file0\x00', 0xff, 0x0, &(0x7f0000000300), 0x1000, &(0x7f0000000a80)={[{@gid={'gid', 0x3d, r8}}, {@map_off='map=off'}], [{@uid_gt={'uid>', r9}}, {@fsname={'fsname', 0x3d, '-self\'&'}}, {@audit='audit'}, {@obj_type={'obj_type', 0x3d, 'posix_acl_accesssystem\\trusted-nodevtrusted'}}]}) fcntl$setpipe(r7, 0x407, 0x0) write(r7, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r10}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000140)=0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r13, 0x407, 0x0) write(r13, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r13, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r14}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) fsetxattr$system_posix_acl(r1, &(0x7f0000000000)='system.posix_acl_access\x00', &(0x7f0000000200)={{}, {0x1, 0x6}, [{0x2, 0x0, r3}, {0x2, 0x5, r5}, {0x2, 0x9, r6}, {0x2, 0x4, r10}, {0x2, 0x2, r11}, {0x2, 0x6, r12}, {0x2, 0x1, r14}], {0x4, 0x2}, [], {0x10, 0x5}, {0x20, 0x1}}, 0x5c, 0x0) 00:22:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) 00:22:55 executing program 2: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) getsockopt$inet6_tcp_int(r7, 0x6, 0x17, &(0x7f00000002c0), &(0x7f0000000380)=0x4) close(r1) 00:22:56 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) close(r0) 00:22:56 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) io_setup(0x14, &(0x7f0000000100)=0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200000005, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000400)={'ip6erspan0\x00', 0x2}) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r8, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) io_submit(r6, 0x1, &(0x7f0000000bc0)=[&(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0xff, r8, &(0x7f0000000ac0)="0761302b5d52860fe101ddb68d796056d11bf4b5472291bb1b305318704c059f43c0858fc7e1a81e3e216edb1d85aa17e7b41ab18748d37534e7b07d746c9ef66c4b484ee95225cc57526f812ea8bc204f9d1780b859e06e632fed310e273e95d68bca481bcd73f4b02b407d422d2903e7829006cf12777e1d4baa88e8f42524a24efe28251aeb870d35171a9aec7da2b5fb2e411cfc5b4b83cae56ff64814e680cf66018e", 0xa5, 0x2, 0x0, 0x4, r0}]) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r10, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r10, 0x1, 0xd, 0x0, 0x0) r12 = accept$unix(r10, &(0x7f0000000400), &(0x7f00000002c0)=0x6e) clock_gettime(0x0, &(0x7f00000005c0)={0x0, 0x0}) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000600)={0x1, 0x4, 0x4, 0x2000, 0x1, {r13, r14/1000+30000}, {0x5, 0x0, 0x5, 0x80, 0xc1, 0x3f, "6f7281d5"}, 0x0, 0x4, @userptr=0x4, 0x4, 0x0, r3}) r16 = openat$6lowpan_control(0xffffffffffffff9c, &(0x7f00000006c0)='/sys/kernel/debug/bluetooth/6lowpan_control\x00', 0x2, 0x0) r17 = socket$phonet_pipe(0x23, 0x5, 0x2) r18 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000980)='/dev/mixer\x00', 0xa440, 0x0) io_submit(r6, 0x5, &(0x7f0000000a40)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x9, r12, &(0x7f0000000480)="1a5eeaa4bd857a6c7f681d749a276afe6e9679bac897ce54cf2eb513e054b9267851b62128282c19c754b80087377a76fd3d7bd798fac31e8854222585972648dc918b65c46d62c068a87ab00ff61098874479ae1d48f78aee89b9ec51e0dd0a113e637e95758a3b50c3a3a0959913a524704dc894fcb9845edda07811a11d699e2dc5ba479fca2a4028a45dbd8a30a6ebf9366e6c068dd4556e881079b57ef29490c613573ab1af7dbbce878d09d71a", 0xb0, 0x1, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x7, 0x2d3b, 0xffffffffffffffff, &(0x7f0000000580)="c39dc10db837d72cc89dc566f9233fac72a45c93c496b1eb1f4577248ed6151d047bcf47b82cd9c59aaea6f07db38487cf39cd43135e5e81377ddfe1c5aa", 0x3e, 0xffff, 0x0, 0x0, r15}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x40, r16, &(0x7f0000000700)="d74b4a10c285ca451759293d787b8d4b789f9529cc8f4d7a4345cfee1b162372d211fad0b3ec4cbae2dd451b8aa28b82f9c2cfdbe9e5c0870bda6a4725f749e0bf25047cac28d81f7c32582b0338e5b71ccbfa1a59a154a0d7a1a55ee70b7d98a2d3772b07f0b024d2d12366897cdadf5eb484b82c745237f42227e95f6a412533ecfe8181ae40ec888b60049d6b43b14e9c4823e49e37609cd1dfefee4d5cde5b1451a305c54701d078e059cbb66b225f19560097ed9daf56deb74939b4868e4fb38aada0c43a73", 0xc8, 0x56b, 0x0, 0x2, r5}, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x8, 0x9, r17, &(0x7f0000000840)="27a1b5de6d619f2b48bd04ed807ac9dc87254d6f7192ed5411300a84bbe9a521f63e5a6fb02eb11108fb988c3d5adca5cf0fc3b3ee05e1f14fcb505768806b4d452b1792d674ff5932881b0894efa60297c1f160426d1ad9ee93661bfd826c2bdc4274a6fba10552d8c20cde2e7ab456948d1158526ac097b7c47b0d82d3e4444a626c688c9f0ca3267912e7bad0ae462085306516f5683a3c0843dd70ddc42fe5ab9133a887e782604518d3a80bb78c12c3d87f53fd15aa21dac6672acb78102d8fb0352e730513", 0xc8, 0x2}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x1, 0x950, r18, &(0x7f00000009c0)="965a3c4206f8de6b63f6294069d55ada03525145193cc6baf928dbf8f55e542dd97f341dd84ae9f200f9ed9d153dcca55c2352bf5918a2cc6f27e15856c0d4", 0x3f, 0x24750000000, 0x0, 0x1}]) close(r1) 00:22:56 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp\x00') r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r10, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r10, 0x1, 0xd, 0x0, 0x0) r12 = socket$inet(0x2, 0x4000000805, 0x0) r13 = socket$inet_sctp(0x2, 0x5, 0x84) r14 = dup3(r12, r13, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r14, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r13, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r14, 0x84, 0x7a, &(0x7f000059aff8)={r15}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp_SCTP_MAXSEG(r10, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r15, 0x6}, &(0x7f0000000300)=0x8) getsockopt$rose(r7, 0x104, 0x2, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) ioctl$DRM_IOCTL_INFO_BUFS(r4, 0xc0106418, &(0x7f0000000180)={0x2, 0x8, 0x1, 0x96, 0x9, 0x7}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000080)={r5, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}, 0x6, 0x0, 0x7f, 0x8, 0x3}, &(0x7f0000000140)=0x98) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:56 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socketpair(0x1e, 0x1, 0x9, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f0000000100)={0xa00000, 0x4, 0x6, 0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x9744f164b438157b, 0x1ff, [], @p_u32=&(0x7f0000000080)=0x2}}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r4, 0x800448d3, &(0x7f0000000280)={@fixed={[], 0x12}, 0x1c, 0x3, 0x5, 0xfc01, 0x1, "1a251cfcd039609e8787cf5205059ae78b8c8ee0f67a3a77092b68b94897af136c6f69ec9a93ce594f6d7e2a9323182447a2eaddd2872d65343a8dadd2a468bc8a08faf4d9c6b4fa028e43cde0723635fabd6ea04da34b4f598af0d64ed8a20a2cf04743d2a4b78bc207d98bbeaeced3a0b69485a3016e5cc8105cf529d0a748"}) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f0000000140)=""/95, &(0x7f00000001c0)=0x5f) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) read$snddsp(r8, &(0x7f0000000340)=""/57, 0x39) r9 = semget(0x0, 0x1, 0x610) semctl$IPC_SET(r9, 0x0, 0x1, 0x0) semtimedop(r9, &(0x7f0000000200)=[{0x2, 0x884f, 0x1000}, {0x1, 0x70, 0x1800}, {0x3, 0x4, 0x800}, {0x0, 0xcf4, 0x1000}, {0x3, 0x0, 0x1000}, {0x2, 0x2}, {0x2, 0x7f, 0x1000}, {0x4, 0x1, 0x800}, {0x2, 0x5, 0x1000}, {0x2, 0x8001, 0x1000}], 0xa, &(0x7f0000000240)={0x77359400}) 00:22:56 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) 00:22:56 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r2, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r10, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r11}) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r13, r14, 0x0, 0x50000000000443) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x101000, 0x0) r15 = openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x12000, 0x0) syz_kvm_setup_cpu$x86(r7, r15, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000008c0)="ff1966baf80cb840b8a981ef66bafc0cedb9800000c00f3235000100000f30660f38814583b80c6500000f23c00f21f83502000e000f23f8b8f7ffffff0f23d80f21f835800000f00f23f8362e660f38044e0c660fc73666bad104b800f03515efc20500", 0x64}], 0x1, 0x1, &(0x7f0000000780), 0x0) write$UHID_INPUT2(r6, &(0x7f0000000680)=ANY=[@ANYBLOB="0c0000e8000000800000061a230f0000000008e45b84958190cb4e0d3de063310c4401741a3a2d7cbed328b5cdaa03bc85abac22e19406afb65567306981cbb045a0b93ae2dd68789f747d1d0ee7679891f02fc81a33c0d9749580e5b95ead35c0b1b822ec11090be779ffc78844854a36c5317c3b99098f91d085acc1f89405ea2a35e2baa3db5dd36c3eb30c2a738106cec64b8529da72d19152d39c8f272af58a48981ef904a3ddb7b5e9f52ef4a35d17062fce2ce55868218031d4e4a67c43f366b92925d09c29e162d87080f61cd1abf17074ae45a0ee4b7acaa05fbb2bfe33977f99dd54e87b282583c971a88e18504f570c86141a07eb09bb2b3515b4b581b13b0f180f79854172ea40d9863c5873a16a5bb19f42c1c9439c39a230f64f633a42e0"], 0x10) 00:22:56 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) close(r0) [ 382.095460] Unknown ioctl -1070574846 00:22:57 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r2, 0x100, 0x70bd2a, 0x25dfdbfe, {{}, {}, {0x18, 0x17, {0x9, 0xfc94, @l2={'eth', 0x3a, 'ipvlan0\x00'}}}}, ["", "", "", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0x44}, 0x8004) 00:22:57 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x101a00, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:57 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x5, 0x480000) fcntl$F_GET_RW_HINT(r1, 0x40b, &(0x7f0000000080)) [ 382.164924] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=21688 comm=syz-executor.3 [ 382.183547] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=21688 comm=syz-executor.3 00:22:57 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r8, 0x0, 0x81, &(0x7f0000000400)={'broute\x00', 0x0, 0x3, 0x18ffb, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000580)=""/102395}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write$P9_RCLUNK(r0, &(0x7f00000002c0)={0x7, 0x79, 0x1}, 0x7) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r9, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) 00:22:57 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') 00:22:57 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r2, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r10, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r11}) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r13, r14, 0x0, 0x50000000000443) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x101000, 0x0) r15 = openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x12000, 0x0) syz_kvm_setup_cpu$x86(r7, r15, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000008c0)="ff1966baf80cb840b8a981ef66bafc0cedb9800000c00f3235000100000f30660f38814583b80c6500000f23c00f21f83502000e000f23f8b8f7ffffff0f23d80f21f835800000f00f23f8362e660f38044e0c660fc73666bad104b800f03515efc20500", 0x64}], 0x1, 0x1, &(0x7f0000000780), 0x0) write$UHID_INPUT2(r6, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x10) 00:22:57 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) close(r0) 00:22:58 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r4 = dup2(r2, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d2, &(0x7f0000000040)={@any=[0x3]}) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) r6 = socket(0x11, 0x800000003, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x1) bind$packet(r5, &(0x7f0000000000)={0x11, 0x0, r10}, 0x14) sendmmsg(r5, &(0x7f0000000d00), 0x400004e, 0x0) r11 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80001, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, &(0x7f0000000340)=0xfffffff8) r12 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r11, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40045000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r12, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x23, 0x1, 'selfbdevwlan1selfvmnet0\'md5sum\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x44008) sendmsg$NLBL_MGMT_C_ADDDEF(r5, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="a16cd26eabacf4bca01168b17cb4d6c4f3e005e2be5584efc41e77cfc05a8d04", @ANYRES16=r12, @ANYBLOB="00042dbd7000fbdbdf250400000006000b001a000000080007007f0000011e00010076626f786e6574306d696d655f747970650000001d62477b1853aa2b2f783a5d54f607fd8bde9d9cf78bb5766a88cb8732d12cbb917f81f3c2cb6e2c8aed308418fd782fbb951afee26a9402f986b839127a36f52e377075d8cc22e2e145fa6e7aaecbcafb221f0915821deaf5419bef1968f173858a2a3a4d"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) sendmsg$NLBL_MGMT_C_VERSION(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r12, 0x2, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0xc}, 0x24000844) sendmsg$NLBL_MGMT_C_VERSION(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x98, r12, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0x1}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast1}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @mcast1}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x7}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0xa, 0x1, 'wlan1\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x11}}]}, 0x98}, 0x1, 0x0, 0x0, 0x45880}, 0x0) 00:22:58 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x7f, 0x2444a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) request_key(&(0x7f00000002c0)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f0000000400)='pagemap\x00', 0xfffffffffffffffb) r2 = request_key(&(0x7f0000000440)='big_key\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f00000004c0)='ecb-cipher_null\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x800) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000580)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:58 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) 00:22:58 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @rand_addr=0x3}, 0x10) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$nl_netfilter(r5, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000340)={0x154, 0xc, 0x8, 0x101, 0x70bd26, 0x25dfdbfb, {0x2, 0x0, 0x5}, [@typed={0x8, 0x1d, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @nested={0x12e, 0x3e, 0x0, 0x1, [@generic="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", @generic="80e5a754c8616d9137faf8e0a5de56407f6c727348e6d706b424f1b5", @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@loopback}]}, @typed={0x8, 0x40, 0x0, 0x0, @fd=r6}]}, 0x154}, 0x1, 0x0, 0x0, 0x240041d4}, 0x10) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x2c501, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x6, &(0x7f0000000380)=[{}, {}, {}, {0x0}, {}, {}]}) ioctl$DRM_IOCTL_NEW_CTX(0xffffffffffffffff, 0x40086425, &(0x7f0000000180)={r11, 0x1}) ioctl$DRM_IOCTL_DMA(r10, 0xc0406429, &(0x7f0000000700)={r11, 0x7, &(0x7f00000005c0)=[0xffff, 0x4, 0x1000, 0x0, 0x6, 0x1, 0x100], &(0x7f0000000640)=[0x2, 0x1, 0x2, 0x3, 0x81, 0x9], 0x38, 0x2, 0x2, &(0x7f0000000680)=[0x80000000, 0x2], &(0x7f00000006c0)=[0x2, 0xca, 0xbf6, 0x1f, 0x20, 0x5, 0x6]}) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f0000000780)='\t', 0x5a, 0x0, &(0x7f0000000740)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0xffffffffffffff1e) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) r13 = socket$inet(0x2, 0x4000000805, 0x0) r14 = socket$inet_sctp(0x2, 0x5, 0x84) r15 = dup3(r13, r14, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r14, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r15, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r14, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r14, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r15, 0x84, 0x7a, &(0x7f000059aff8)={r16}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x7a, &(0x7f000059aff8)={r16}, &(0x7f000034f000)=0xfffffe6e) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r5, 0x84, 0x6f, &(0x7f0000000000)={r12, 0xd0, &(0x7f0000000100)=[@in6={0xa, 0x4e24, 0x3, @remote, 0x10000}, @in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e22, 0x0, @empty, 0x6}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x8, @dev={0xfe, 0x80, [], 0x36}, 0x4}, @in={0x2, 0x4e24, @broadcast}, @in6={0xa, 0x4e23, 0x100, @mcast1, 0x5}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e22, @local}, @in={0x2, 0x4e23, @multicast2}]}, &(0x7f0000000080)=0x10) socket$can_raw(0x1d, 0x3, 0x1) r17 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r18 = socket$alg(0x26, 0x5, 0x0) bind$alg(r18, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r19 = accept4(r18, 0x0, 0x0, 0x0) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r19, r20, 0x0, 0x50000000000443) setsockopt$inet_udp_encap(r20, 0x11, 0x64, &(0x7f0000000600)=0x4, 0x4) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, &(0x7f0000000040)) accept$inet(r17, &(0x7f0000000200)={0x2, 0x0, @empty}, &(0x7f00000002c0)=0x10) 00:22:58 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000000, 0x2010, r0, 0xe79c4000) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) [ 383.185070] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=21737 comm=syz-executor.0 00:22:58 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r2, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r10, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r11}) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r13, r14, 0x0, 0x50000000000443) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x101000, 0x0) r15 = openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x12000, 0x0) syz_kvm_setup_cpu$x86(r7, r15, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000008c0)="ff1966baf80cb840b8a981ef66bafc0cedb9800000c00f3235000100000f30660f38814583b80c6500000f23c00f21f83502000e000f23f8b8f7ffffff0f23d80f21f835800000f00f23f8362e660f38044e0c660fc73666bad104b800f03515efc20500", 0x64}], 0x1, 0x1, &(0x7f0000000780), 0x0) write$UHID_INPUT2(r6, &(0x7f0000000680)=ANY=[@ANYBLOB="0c0000e8000000800000061a230f0000000008e45b84958190cb4e0d3de063310c4401741a3a2d7cbed328b5cdaa03bc85abac22e19406afb65567306981cbb045a0b93ae2dd68789f747d1d0ee7679891f02fc81a33c0d9749580e5b95ead35c0b1b822ec11090be779ffc78844854a36c5317c3b99098f91d085acc1f89405ea2a35e2baa3db5dd36c3eb30c2a738106cec64b8529da72d19152d39c8f272af58a48981ef904a3ddb7b5e9f52ef4a35d17062fce2ce55868218031d4e4a67c43f366b92925d09c29e162d87080f61cd1abf17074ae45a0ee4b7acaa05fbb2bfe33977f99dd54e87b282583c971a88e18504f570c86141a07eb09bb2b3515b4b581b13b0f180f79854172ea40d9863c5873a16a5bb19f42c1c9439c39a230f64f633a42e0"], 0x10) 00:22:58 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 383.737417] Unknown ioctl -1070574846 00:22:59 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) 00:22:59 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1007f, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2, 0xc, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(fpu(pcbc(aes-aesni)),crct10dif-pclmul)\x00'}, 0xffffffffffffff5a) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r3, 0x40045731, &(0x7f00000002c0)=0x3ff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) setsockopt$CAIFSO_REQ_PARAM(r0, 0x116, 0x80, &(0x7f0000000400)="a9ce927fd3e6be0cedbcebcdc15ba80f40da8c25f0c3c3395147feed7015640932fa5cf6ea42b857faf5fe71d60f0cadd58c4945f1cec2ac126ab57ab5feba5114de18f91bfb691e31d052cdd262554ddfa92cf68e207b8f612d1b53ca0eaa88b6d13b8a48f725f2701699bb3ac5bb30753810e16152cb56b4cd3af8b90bfa", 0x7f) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r5, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getsockopt$EBT_SO_GET_ENTRIES(r6, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r7, 0x89e3, &(0x7f0000000280)=0x1) openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x80044, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r9, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r10 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x100800) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r11, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r4) 00:22:59 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x181082, 0x0) ioctl$sock_netrom_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={0x0, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={'rose', 0x0}, 0x9, 'syz0\x00', @default, 0x1, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @default]}) r2 = accept4(r0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f00000000c0)) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) fcntl$addseals(r4, 0x409, 0x4) 00:22:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x404001, 0x0) write$P9_RFSYNC(r1, &(0x7f0000000080)={0x7, 0x33, 0x2}, 0x7) 00:22:59 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x40000) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) bind$can_raw(r3, &(0x7f0000000000), 0x10) 00:22:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$TIOCSBRK(r4, 0x5427) r5 = getpid() sched_setattr(r5, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r6 = syz_open_procfs(r5, &(0x7f00000000c0)='net/psched\x00') sendfile(r1, r6, 0x0, 0x50000000000443) ioctl$KVM_GET_REG_LIST(r6, 0xc008aeb0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100d983000018000100000001000000"]) r7 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r7, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:22:59 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r2, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r9, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r10}) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r12, r13, 0x0, 0x50000000000443) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x101000, 0x0) r14 = openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x12000, 0x0) syz_kvm_setup_cpu$x86(r6, r14, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000440)=[@text32={0x20, &(0x7f00000008c0)="ff1966baf80cb840b8a981ef66bafc0cedb9800000c00f3235000100000f30660f38814583b80c6500000f23c00f21f83502000e000f23f8b8f7ffffff0f23d80f21f835800000f00f23f8362e660f38044e0c660fc73666bad104b800f03515efc20500", 0x64}], 0x1, 0x1, &(0x7f0000000780), 0x0) 00:22:59 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000008101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r4 = socket(0x10, 0x2, 0x0) write(r4, &(0x7f0000000000)="1c0000001a009b8a14000000ff0000adf87e28000000000000000000", 0x1c) recvmmsg(r4, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r4, &(0x7f0000000440)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYRES16=r5, @ANYBLOB="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"], 0x2}, 0x1, 0x0, 0x0, 0x4000000}, 0xe206c26ae4fb48fe) sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2580800}, 0xc, &(0x7f0000000380)={&(0x7f00000005c0)=ANY=[@ANYBLOB="34010000", @ANYRES16=r5, @ANYBLOB="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"], 0x134}, 0x1, 0x0, 0x0, 0x844}, 0x20008080) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r2, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r8 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r8, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:22:59 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 384.536432] Unknown ioctl -1070574846 00:22:59 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socket$alg(0x26, 0x5, 0x0) 00:23:00 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) fchmodat(r3, &(0x7f0000000000)='./file0\x00', 0x8) 00:23:00 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r11, r12, 0x0, 0x50000000000443) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x101000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000880)='/dev/zero\x00', 0x12000, 0x0) 00:23:00 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000080)={0x0, 0x10001, 0x6, 0x8, 0x8, 0x4, 0x3f, 0x7, {0x0, @in6={{0xa, 0x4e23, 0x8, @local}}, 0x401, 0x4, 0x9, 0x1, 0x9b0d}}, &(0x7f0000000000)=0xb0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000140)={r1, @in={{0x2, 0x4e22, @local}}, 0x3, 0xf0f, 0x2, 0x86, 0x9, 0x3}, &(0x7f0000000200)=0x9c) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$VIDIOC_QUERY_EXT_CTRL(r2, 0xc0e85667, &(0x7f00000000c0)={0x40000000, 0x101, "8d82b6257df4146d8ef252442652e65f46a8f046fbfcbf62ab1fd8ead7ec8edf", 0x1, 0xab, 0x5, 0x2, 0x5da, 0x5, 0x1, 0x3, [0x8001, 0x6, 0x4, 0x7fff]}) sendfile(r1, r2, 0x0, 0x50000000000443) r3 = openat(r2, &(0x7f0000000000)='./file0\x00', 0x24100, 0x2c) ioctl$BLKFLSBUF(r3, 0x1261, &(0x7f0000000080)=0x6) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) syz_emit_ethernet(0x2a, &(0x7f0000000180)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, {0x0, 0x0, 0x8}}}}}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x6) write(r5, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r9}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r11, r12, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_GET_CLIENT(r12, 0xc0286405, &(0x7f00000002c0)={0x6, 0x9, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x3, 0x610}) getuid() r13 = socket$alg(0x26, 0x5, 0x0) bind$alg(r13, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r14 = accept4(r13, 0x0, 0x0, 0x0) r15 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r14, r15, 0x0, 0x50000000000443) getsockopt$inet_IP_XFRM_POLICY(r15, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@remote, @in=@remote}}, {{@in=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000400)=0xe8) pipe(&(0x7f0000000740)) 00:23:00 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) lseek(r3, 0x51, 0x1) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r2, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:00 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 385.466791] Unknown ioctl -1070574846 00:23:00 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'ipvlan1\x00', {0x2, 0x4e24, @local}}) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:00 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x101000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000200)={0x10}) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$VHOST_GET_VRING_BASE(r6, 0xc008af12, &(0x7f0000000140)) getsockopt$netlink(r3, 0x10e, 0x8, 0x0, &(0x7f0000000100)) accept(r3, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000000)=0x80) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f00000002c0)=0x2) syz_open_dev$tty1(0xc, 0x4, 0x2) 00:23:00 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r11, r12, 0x0, 0x50000000000443) openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x101000, 0x0) 00:23:01 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000080)=0x4) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) getsockname$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000180)=0x14) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$VIDIOC_SUBDEV_S_FMT(r6, 0xc0585605, &(0x7f00000002c0)={0x0, 0x0, {0x0, 0xdc, 0x1002, 0x9, 0xb, 0x4, 0x0, 0x7}}) 00:23:01 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:01 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x80fe, 0x0, 0x0, 0x0, 0x6, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x800) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x2, &(0x7f00000002c0)=0x19, 0x4) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000ffa000/0x3000)=nil) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/load\x00', 0x2, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:01 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000380), &(0x7f0000000200)=0x4) close(r1) [ 386.334849] Unknown ioctl -1070574846 00:23:01 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept4$rose(r4, &(0x7f0000000100)=@full={0xb, @dev, @bcast, 0x0, [@null, @remote, @bcast, @netrom]}, &(0x7f0000000140)=0x40, 0x80000) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:01 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r11, r12, 0x0, 0x50000000000443) 00:23:01 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400580, 0x0) fadvise64(r1, 0xddc, 0x81, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r8, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r8, 0x1, 0xd, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r8, 0x0, 0x80, &(0x7f0000001400)=@nat={'nat\x00', 0x19, 0x4, 0x5d, [0x200001c0, 0x0, 0x0, 0x20000500, 0x20000530], 0x0, 0x0, &(0x7f0000001380)=ANY=[@ANYRES64, @ANYRES16=r3, @ANYRESHEX=r2, @ANYRESHEX, @ANYRES64=r0, @ANYRESOCT=r0, @ANYRES64, @ANYPTR64=&(0x7f0000001340)=ANY=[@ANYRESOCT, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESOCT=0x0, @ANYRES32=0x0, @ANYRES32=r1]]]}, 0xd5) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/zoneinfo\x00', 0x0, 0x0) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r10, 0x65, 0x3, 0x0, &(0x7f0000000780)=0xfffffffffffffe38) 00:23:01 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) 00:23:01 executing program 3: r0 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) keyctl$restrict_keyring(0x1d, r0, &(0x7f00000000c0)='id_resolver\x00', 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$peeksig(0x4209, r1, &(0x7f0000000000)={0x9, 0x0, 0x4}, &(0x7f0000000140)=[{}, {}, {}, {}]) socket$can_raw(0x1d, 0x3, 0x1) 00:23:01 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000140)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) read(r6, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$FOU_CMD_GET(r6, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYRES16=0x0, @ANYRES32], 0x2}, 0x1, 0x0, 0x0, 0x200000c4}, 0x4000010) r8 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000400)='l2tp\x00') sendmsg$L2TP_CMD_SESSION_CREATE(r6, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r8, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@L2TP_ATTR_DATA_SEQ={0x5, 0x4, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x1) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x1c, r8, 0x20, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5}]}, 0x1c}}, 0x44800) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000000), 0x4) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:02 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:02 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$SCSI_IOCTL_SEND_COMMAND(r3, 0x1, &(0x7f0000000080)={0x37, 0x1, 0x7fffffff, "85e98248271afee45439958363dbd9118095e93c2b0471078e5f55301e61160218126adf9561d26f929e9c7cf0bb37a47f6b6b5080909f"}) 00:23:02 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 387.111024] Unknown ioctl -1070574846 00:23:02 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x8, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000400)=""/206) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$RTC_AIE_OFF(r8, 0x7002) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r9, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) 00:23:02 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) pipe(&(0x7f0000000200)) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:02 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) sendfile(r11, 0xffffffffffffffff, 0x0, 0x50000000000443) 00:23:02 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$TIOCSIG(r3, 0x40045436, 0x23) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:02 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:02 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) mknodat(r3, &(0x7f0000000000)='./file0\x00', 0x9928, 0xffffff7f) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 388.016277] Unknown ioctl -1070574846 00:23:03 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000004000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) r5 = getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bsg\x00', 0x500, 0x0) write$cgroup_pid(r6, &(0x7f0000000380)=r5, 0x12) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r7 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r7, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:03 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:03 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) sendfile(r11, 0xffffffffffffffff, 0x0, 0x50000000000443) 00:23:03 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1b) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 388.586629] input: syz1 as /devices/virtual/input/input48 00:23:03 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 388.650400] input: syz1 as /devices/virtual/input/input49 00:23:03 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000080)=[{{0x3, 0x0, 0x0, 0x1}, {0x1, 0x0, 0x1, 0x1}}, {{0x4, 0x1, 0x0, 0x1}, {0x2, 0x1, 0x1}}], 0x10) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)) 00:23:03 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000000)={0x2, 0x1, 0x206, 0x10001, 0xffffffff, 0x9, 0xacd, 0x5, r6}, &(0x7f0000000040)=0x20) [ 388.776701] Unknown ioctl -1070574846 00:23:03 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) r6 = accept4$packet(r0, 0x0, &(0x7f00000002c0), 0xc0800) ioctl$FS_IOC_MEASURE_VERITY(r6, 0xc0046686, &(0x7f0000000400)={0x0, 0x73, "8bc8e21ac7e2fd5025be36d18a7cb460eda6955477aa823936c8ca7694ac0448c4c9f64d1f72ebb97453ae2bfa55da448899604823672795359bd895b94c8e211ab23f142d1d78e1581e826c9e9af2ae69f537c8fa9fc10512c2d19083d888aa98669b781467e8164aff3ef3ab348dbf589a45"}) close(r1) 00:23:04 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) sendfile(r11, 0xffffffffffffffff, 0x0, 0x50000000000443) 00:23:04 executing program 4: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 389.579493] Unknown ioctl -1070574846 00:23:04 executing program 0: getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, &(0x7f0000000040)) r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x0) getsockopt$TIPC_SRC_DROPPABLE(r0, 0x10f, 0x80, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 4: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:04 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000680)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r6}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) r7 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r8}}]}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000100)={r3, r6, r8}, 0xc) fcntl$lock(r1, 0x6, &(0x7f00000000c0)={0x1, 0x4, 0x43, 0x3, r3}) 00:23:04 executing program 4: getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) [ 389.723287] hfsplus: gid requires an argument [ 389.727964] hfsplus: unable to parse mount options 00:23:04 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) r6 = accept4$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000380)=0x1c, 0x40800) ioctl$sock_proto_private(r6, 0x89e1, &(0x7f0000000400)="2591eaa2c3666548d5423f5c2b0f666d9414ef1ec8ad108ae85512d46d820bfb018b4b1345358c887369dd612d20431b4354276f3d47b448eae5fafc576d79584d7f4b94abbc000cd6b4881c780125a150d9407ddf8c1f9ce8985b9f54344b33cf361c0a810663140502593b9f81f8f2274318e561ca87999a2b764b5d90e63a71ce7ceaf308542a6610f8a0632a7a2a77f49566e7844870253332ed22b48fb4c4af9b1652015a0a63ff846ec517528035e6") close(r1) 00:23:04 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000540)=0x0, &(0x7f0000000580)=0x4) ioctl$KVM_SET_CLOCK(r3, 0x4030ae7b, &(0x7f0000000000)={0x1, 0x4}) bind$can_raw(r0, &(0x7f00000005c0)={0x1d, r4}, 0x10) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:04 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:05 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:05 executing program 4: socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 00:23:05 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(0xffffffffffffffff, r11, 0x0, 0x50000000000443) 00:23:05 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000080)={0xf89ffff, 0x1f, 0x6b, r0, 0x0, &(0x7f0000000000)={0x98090d, 0x5, [], @value64=0x7}}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100)='batadv\x00') r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r6, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000440)=0x11) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000340)={&(0x7f00000000c0), 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x5c, r2, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2f}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x9}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r8 = socket$can_raw(0x1d, 0x3, 0x1) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) r12 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r12, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r13 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cachefiles\x00', 0x800, 0x0) sendmsg$TIPC_CMD_SHOW_STATS(r13, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x8091}, 0x0) getsockopt$sock_linger(r10, 0x1, 0xd, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(r10, 0x8955, &(0x7f0000000380)={{0x2, 0x4e23, @broadcast}, {0x6, @dev={[], 0x1a}}, 0x20, {0x2, 0x4e21, @multicast2}, 'veth1_to_batadv\x00'}) getsockopt$CAN_RAW_LOOPBACK(r8, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:05 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:05 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, &(0x7f00000000c0)) 00:23:05 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) [ 390.423868] Unknown ioctl -1070574846 00:23:05 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) recvfrom$l2tp6(r3, &(0x7f0000000080)=""/4096, 0x1000, 0x90, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x20) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:05 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) 00:23:05 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = dup(0xffffffffffffffff) ioctl$KVM_ARM_SET_DEVICE_ADDR(r2, 0x4010aeab, &(0x7f0000000380)={0x9, 0x10000}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCSREP(r5, 0x40084503, &(0x7f00000002c0)=[0x6, 0x4]) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:05 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_JOIN_FILTERS(r0, 0x65, 0x6, 0x0, 0x0) 00:23:05 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(0xffffffffffffffff, r11, 0x0, 0x50000000000443) 00:23:06 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = openat$cgroup_ro(r4, &(0x7f00000001c0)='cpu.stat\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_XRUN(r5, 0x4148, 0x0) r6 = accept4(r1, 0x0, 0x0, 0x0) r7 = getpid() sched_setattr(r7, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) r9 = syz_open_procfs(r8, &(0x7f00000000c0)='net/netlink\x00') sendfile(r6, r9, 0x0, 0x50000000000443) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r9, 0x4040534e, &(0x7f0000000000)={0x140, @time={0x8, 0xffffffff}, 0x9, {0x3f, 0x5e}, 0x8, 0x0, 0x20}) r10 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r10, 0x65, 0x3, 0x0, &(0x7f0000000200)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_NOTIFY_RETRIEVE(r11, &(0x7f0000000140)={0x30, 0x5, 0x0, {0x0, 0x1, 0x1, 0x8}}, 0x30) 00:23:06 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 391.221287] Unknown ioctl -1070574846 00:23:06 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) recvfrom$inet(r2, &(0x7f0000000240)=""/155, 0x9b, 0x0, &(0x7f0000000300)={0x2, 0x4e24, @empty}, 0x10) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) symlinkat(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') ioctl$MON_IOCX_GETX(r4, 0x4018920a, &(0x7f0000000180)={&(0x7f0000000080), &(0x7f00000000c0)=""/139, 0x8b}) 00:23:06 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r3, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r0, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f0000000180)) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000200)=0x4) close(r2) 00:23:06 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(0xffffffffffffffff, r11, 0x0, 0x50000000000443) 00:23:06 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x80000, 0x0) setsockopt$llc_int(r0, 0x10c, 0x8, &(0x7f0000000080)=0x4, 0x4) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/policy\x00', 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f00000000c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000040)=0x4, 0x4) 00:23:06 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) syz_open_dev$sndseq(&(0x7f00000002c0)='/dev/snd/seq\x00', 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:07 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 392.132401] Unknown ioctl -1070574846 00:23:07 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f00000000c0)) sendmsg$alg(r1, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000200)="48c932a34ed0910ac0b6ef83c329d31717f28b257f3e180e17f77efe321aac82360b573817b6ac78c890d00709630f2ac12443", 0x33}, {&(0x7f0000000240)="ebcfe8517307bf7bc8f3d3745077d8fdc608d9ae115c4548c4185d441a826c7856f24961af5c7e44d66c2366ceba97e3dcd9df98252733430ff4ea4f3ba259f2a2693c1e266f123bee7b659a1f60ad145e39b4691745cbed32c2622f1f5f02c96df1aa492ce4c500be70fa0a793f19a5d78c4a2c7b711247b0680999dceeffedfdc30995f5c87b82c07c55aa8b4368b66f8f620f34b5c5ebff91e887e1ee84391a028569f1b7ffdb5b2ade06791d84264226641330400726e6252e29", 0xbc}, {&(0x7f0000000300)="e7c6ba7e495e21c5cda4b696c5a9ebec9cbb5fb8a5410889e90e3e9c0028b66f5c665f36652cb0898ff2baaf1099820a369ca8acad9520e159616d8151b15830319274fae04b54b93c69388bacd409ac1ed2bfa8254e84a74c035eae6fe7fe6717db4ef07fb4c02af8ccfbd741cbbd8acf1cedd93be8f155e417a56f4de2290432fe9b8c4e117ed1373138034dcaadfdd5bf5c167d3ce393c72361d8ec9df65d1a2612c26bbe4cfd596e1a1d3e589167023505d0eb0fa3ab99", 0xb9}, {&(0x7f00000003c0)="3ddda558311a82c743d898ccd59b73856a87d387ecd565be807d7ce97d18b380b24881f31347406331c2c507e366f1518ac8b620a8d199b8e923092be63acd81578b8c6a80b54f07667f4d305ed8c99f855ca1def34fe2ec9d18497705a5862514649330c23f10de926eae4eeefefff4eb2af5913bbac947d12fc331b132a1d708e3767de93ef93552fc632752f355bd536baa21b957997318c388e599b51fc485c29d76987e9b4cadea9256b17f4b27e01235cef9229c05e00277eafe10e3ee63674bfba2de33e458391a0b02664db0c686fae0b0abc72c5d561ae1e062f35c47572469e8a4a7ae8a84fc5f5bbb", 0xee}, {&(0x7f00000004c0)="6376f32323ffc1d4c80395c172cb5f38c1c50abef47e6680478de88105b662bcf77588340afa1aed6b", 0x29}, {&(0x7f0000000500)="ca86c2c10de0c629561183e5f08fb7d8f87d4da012f596524cfbaa7a768eb23aa5c92171e9cb808e997be2e5cde80ae95635d7fb97a432410c007b82d79294e0c7e1637c745c8edbb65978e26693cb3881fa31b057cd4aa051a220124833994e7fe786d6d9af2eac3e3f3238892e9e8ddc11a75025689dc010a30d669303890d78217f9bc72492e873d6e3d139895589504ce56e71af3931f736408eb6737b65ef1b4c509782913458590231908c07ddb8c0f488e57281984b8be17a781b736d70e79f621eb72b7225a5a877b10f574a19ee9f315003423ca74dcd", 0xdb}, {&(0x7f0000000600)="4862b96966bd27cb8dcf72147e7695f3fc61bd490d2bf54c9427abceba4f719d71ff27740444e6fca887d096", 0x2c}], 0x7, &(0x7f00000006c0)=[@assoc={0x18, 0x117, 0x4, 0x80000001}, @iv={0xd0, 0x117, 0x2, 0xb6, "85866d8fbfc98357db3ad169eb966f10bc650f6768c774e82155c308790351cdb5946a67f18979819ee54572b5a0efd54cc3d443531aa46730544c4cea4ffc49644074d9f55e4f10e4eb02ad79314be091e0b5d3e2d84f17003fd1714e8cfa570046f7285642b414d95b5d6832dc90e8530f17098db3c46261d718a7db3ca517e1ca6073fb1bb18efb1075604a02a1717942d6c9af3c05617a64e406764529be4cfea02b31f5c23e3a7e8fc8d7ff635bc09181dedddd"}, @iv={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x98, 0x117, 0x2, 0x83, "0c99bd6bff96a90d6ade7362cec79cc0d8f4fbb78f65ddc7ade14a79f3f5c4b06b77f481ed7ff10c45acac7576f1ee725a8f27f36a7c9fd74cd73b8b3ec6ad534efcf39e464d1da50070142ab1d9f35b2c34f714bb28de12d210facd618a9333bc26e32f6b5c355aecb4fcca3e0e0fc234fbeaae7f71fb875547026a2a2924e046dec2"}, @iv={0x110, 0x117, 0x2, 0xf6, "8031b6170e59cb16269f76c45ac9851528096239a2c06fc79e2d8d8a2f4a718b8abdca60435b190d89f07c28dcf63e4d9e6b0e325900d70ed2f5538a9ae11f48a529423a941b38cb80cd3a4343d98ee6e910f64126b8174c41c21b63e811e3d653e162ebbae02574d6fc8b31d8b45f934f1a4b25e0ee3f9c236c649fe771e167ade68841c9022e9f28e459ef6af7f45520f9594f4de41108f993f71983b12b0bcacce3fa31e2fb852a1c096da9850df55ca9cc393492e7f88a39fe3c0aa00edeea10bfeb3a59426a39d2f9f673a5ae9d983693a0a2652ef3159ba9fa310640048a987c39cd2198ef5a06473a9c782367bef3a4fae0f2"}, @op={0x18}], 0x2d8, 0x40}, 0x2000000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/autofs\x00', 0x80000, 0x0) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000a40)) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000c40)=ANY=[@ANYBLOB="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"], 0xc0}, 0x1, 0x0, 0x0, 0x40}, 0x24000895) 00:23:07 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$SIOCX25SCUDMATCHLEN(r6, 0x89e7, &(0x7f0000000080)={0x1e}) sendfile(r2, r3, 0x0, 0x50000000000443) connect$vsock_stream(r3, &(0x7f0000000000)={0x28, 0x0, 0x2711, @local}, 0x10) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:07 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r11, r12, 0x0, 0x50000000000443) 00:23:07 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x50000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000080)={0x0, 0x73, "81df09871cffe65b0d9ee84e254cdf8a3b75ec893dba940d8f6288209982f3ce9b20094da1dd2731742b7fe65556e63a45ab71eaa2073c9cbad52227058778e0e31f388b870daf7b69cf2a21f17bd9f75d38f9c1f9d2fed8767c6c926fc2fa94813c23f773bfa8a67f50f837a0bd8eb351cef5"}, &(0x7f0000000100)=0x7b) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000140)={r2, 0x5}, 0x8) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:07 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) syz_open_dev$mice(&(0x7f0000001200)='/dev/input/mice\x00', 0x0, 0x20000) openat(0xffffffffffffff9c, &(0x7f0000001280)='./file0\x00', 0x30dc00, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, 0x0, &(0x7f0000001240)) 00:23:07 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:07 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000b40)='net/fib_triestat\x00') r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x90906, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7}, 0x8004, 0x8101, 0x0, 0x0, 0x28, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r0, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r2 = dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) r8 = getpid() sched_setattr(r8, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) ioctl$NS_GET_OWNER_UID(r7, 0xb704, &(0x7f0000000640)=0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) r11 = getpid() sched_setattr(r11, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r12 = getuid() newfstatat(0xffffffffffffff9c, &(0x7f0000000740)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000800)={0x0, 0x0}) getresuid(&(0x7f0000000880), &(0x7f00000008c0), &(0x7f0000000900)=0x0) r16 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r16, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r17 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r17, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r18 = socket$alg(0x26, 0x5, 0x0) bind$alg(r18, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r19 = accept4(r18, 0x0, 0x0, 0x0) r20 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r19, r20, 0x0, 0x50000000000443) r21 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000940)='\x00', r20}, 0x10) r22 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r22, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r23 = socket$inet6_udplite(0xa, 0x2, 0x88) r24 = socket$rds(0x15, 0x5, 0x0) r25 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r25, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r26 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r26, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r27 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r27, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r28 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r28, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r29 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r29, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r30 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r30, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r31 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r31, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r32 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r32, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r33 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r33, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r34 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r34, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r35 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r35, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000b00)=[{&(0x7f0000000400)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000002c0)="f4b3150fbc6fd205ada8c58fcc92f4664d32813d68c6dcc82d748367", 0x1c}, {&(0x7f0000000480)="f073e52ae088227026931fb1d15d67dd30ba22aa49a579ea97a97ca6acec3c10382b95e0b3e45c6baca7f8df69cfcb8f8a61f8f8c68af365f559d90ce532e99c88dd6c7550ccc75773df549edc7f2d8a4c32212a16e97d9ff0c0a0f2487862f0e0e209c418f658c71ea18350aa6e81a0d98d3f0db0ac398c3c0ac373801efbe0da523af36a", 0x85}, {&(0x7f0000000580)="5c14e13ddc7fb4716098c02fdffec148bd750bb6f2740af4b86efa5163cf210322bd816d26883126592339f99a9491b30ecf7eda49a1e000042e9c291acedec5303f35ddf6e5f3dfb96534446525cadac62c18c8e0174f9c8672affbe63678b7f75bc0c19eb2aae60f905d90763ddcb3ed4902d035cc13473c50322c7d95d53f3516adbf1712eece92c7286d47588a4811776c602fb0e9867919537d499ddac51d67df98b12df2a0253d2eee1c5266545e", 0xb1}], 0x3, &(0x7f00000009c0)=ANY=[@ANYBLOB="1c0000000000009695e54d0566489a0058e69142c4c57d7203a2e3c64c98000873171a63093e1644", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=0xee01, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r1, @ANYRES32=r21, @ANYBLOB="1c000000000000000100000001000000", @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r25, @ANYRES32=r5, @ANYRES32=r26, @ANYRES32=r1, @ANYRES32=r27, @ANYRES32, @ANYBLOB="000000001c000000004b00"/26, @ANYRES32=r28, @ANYRES32=r29, @ANYRES32=r30, @ANYBLOB="0000000028000001000000000100000001000000", @ANYRES32=r31, @ANYRES32=r32, @ANYRES32=r33, @ANYRES32=r2, @ANYRES32=r34, @ANYRES32=r35], 0x118, 0x8080}], 0x1, 0x24004804) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r36 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r36, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r4) [ 392.999938] Unknown ioctl -1070574846 00:23:08 executing program 3: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000340)={'batadv_slave_1\x00'}) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bsg\x00', 0x10200, 0x0) getsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) write$UHID_CREATE(r2, &(0x7f0000000200)={0x0, {'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f0000000100)=""/233, 0xe9, 0x8, 0x8001, 0x1ff, 0x3, 0x7}}, 0x120) 00:23:08 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$phonet(0x23, 0x2, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000240)="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") r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r1, 0xc0046686, &(0x7f0000000480)={0x2, 0xd9, "79dc9cc2c9d15ef1058095198f8f1965a64c05079e4083d6ce32781736eda7e93f4bd1e3bcd9b7295f93b34a454c0806976c59be5f98138112171fa9d3e7d06c4ab857964461bb4c1bf4d5edcb79bfa9230e94d02b0b900e54507ed4d2861699a81db24f094836ca07d1a73c6d3377da9a4013308d04bb9f8e512937462249b9bfb92d18c9d60b5c0b1581d48d12bf9943a7aa46f7c8b9c531bb890a7862f09ab850a80b07bdee3c68a595dbeeca72e134058ae9de7e93b1944e42862c791decd43da7c0c3e63967de4b9164a8be1d881e196311b24e0f624d"}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r6 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r6, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r5, 0x10e, 0x4, &(0x7f0000000580)=0x3ff, 0x4) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r6, &(0x7f0000000440)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r7, 0x200, 0x70bd26, 0x25dfdbfb, {{}, {}, {0x10, 0x13, @udp='udp:syz1\x00'}}, [""]}, 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x5010) sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$KVM_SET_VCPU_EVENTS(r5, 0x4040aea0, &(0x7f0000000080)={0x5, 0x3, 0x3, 0x0, 0x2, 0x3, 0x40, 0xff, 0x1, 0x3, 0x0, 0x5, 0x0, 0x81, 0x5, 0x2, 0x1, 0x6, 0x81, [], 0x7, 0x7fff}) r8 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000000c0)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f00000001c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x64, r8, 0x8, 0x70bd27, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @NLBL_UNLABEL_A_SECCTX={0x26, 0x7, 'system_u:object_r:lost_found_t:s0\x00'}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'vlan0\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x810}, 0x4000000) [ 393.135874] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=22182 comm=syz-executor.3 00:23:08 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r11, r12, 0x0, 0x50000000000443) 00:23:08 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:08 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000007000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000040)="660f382b1a0f01df0f300f32d9e90f086665676426f7c5000000000f2245deef1e03e5", 0x23}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, 0x0, &(0x7f0000000040)) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, &(0x7f0000000100)={0x20}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0xfffffffffffffffc, 0x100, 0x0, 0x0, 0x4, 0x0, 0x4cb, 0x80000000], 0x10000}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000100)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {r7, 0x88}}, 0x10) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r9, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) 00:23:08 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x4, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 393.800819] Unknown ioctl -1070574846 [ 393.973292] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43 sclass=netlink_route_socket pig=22209 comm=syz-executor.3 00:23:09 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sysvipc/msg\x00', 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) 00:23:09 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socket$can_raw(0x1d, 0x3, 0x1) 00:23:09 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000080)={0x2, 0x2, {0x3, 0x1}, 0x400}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:09 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80000, 0x0) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000080)={0x5, 0x21, "bb1fd3fd94a683a76d6a570775f81698a783285c2c895975d8559a42f3a7a84533"}) ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f00000000c0)=0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:09 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = accept4(r0, &(0x7f0000000080)=@nl=@proc, &(0x7f0000000000)=0x80, 0x80000) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040)='gtp\x00') sendmsg$GTP_CMD_DELPDP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r3, 0x1b, 0x0, 0x0, {}, [@GTPA_VERSION={0x8}]}, 0x1c}}, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r3, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@GTPA_MS_ADDRESS={0x8, 0x5, @multicast2}, @GTPA_I_TEI={0x8, 0x8, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040040}, 0x8800) 00:23:09 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$VHOST_GET_VRING_BASE(r2, 0xc008af12, &(0x7f0000000080)) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) setsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, &(0x7f0000000000)=0x1, 0x4) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x800, 0x0) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r7, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r7, 0x1, 0xd, 0x0, 0x0) r9 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) sendmsg$NBD_CMD_CONNECT(r4, &(0x7f0000000340)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)={0x60, r5, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8, 0x1, r7}]}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x7fff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x64}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8, 0x1, r9}]}]}, 0x60}, 0x1, 0x0, 0x0, 0x1}, 0x40000) 00:23:09 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) r10 = socket$alg(0x26, 0x5, 0x0) r11 = accept4(r10, 0x0, 0x0, 0x0) r12 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r11, r12, 0x0, 0x50000000000443) 00:23:09 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:09 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:09 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) lseek(r0, 0x6fb, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r5, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, &(0x7f00000002c0)={0x0, r8, 0xff, 0x9, 0x2, 0x99f}) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r2) [ 394.713014] Unknown ioctl -1070574846 [ 394.725275] Unknown ioctl -1070574846 00:23:10 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r10 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r10, r11, 0x0, 0x50000000000443) 00:23:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x400000) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000080)={0x0, @reserved}) 00:23:10 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x42000, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$VIDIOC_CREATE_BUFS(r4, 0xc100565c, &(0x7f00000000c0)={0x7, 0x6, 0x4, {0xb, @sliced={0x8, [0x2, 0x2, 0x401, 0x9, 0xbb7, 0x0, 0x6, 0x80, 0x7f, 0x837, 0x1, 0x921e, 0xa5, 0x0, 0x2, 0x1, 0x9, 0x20, 0x1000, 0x1, 0x7, 0xc263, 0xd37, 0x1ff, 0x135, 0x20, 0xf46, 0xf6f, 0x6, 0x7ff, 0x0, 0x9, 0x9, 0x2, 0x5, 0x363b, 0x2, 0xffff, 0x5, 0x3, 0x5, 0x24, 0xe7c7, 0x100, 0xfffb, 0x1, 0x0, 0x1], 0x3}}, 0x1}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x0, 0x0, 0x3, 0x0, 0x6, 0x9}, 0x20) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:10 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:10 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 395.481735] Unknown ioctl -1070574846 [ 395.513926] Unknown ioctl -1070574846 00:23:10 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x2a9, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r4, @ANYBLOB="000000000000000028001200090001007665746800000000180002001400010000000000", @ANYRES32=0x0, @ANYBLOB="0000b20000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38000000240007050000004007a2a30005000000", @ANYRES32=r4, @ANYBLOB="00000000ffffffff000000000900010068667363000000000800020000000000"], 0x38}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {}, {0xfff1}}, [@filter_kind_options=@f_rsvp={{0x9, 0x1, 'rsvp\x00'}, {0xc, 0x2, [@TCA_RSVP_DST={0x8, 0x2, @dev}]}}]}, 0x3c}}, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r7, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) 00:23:10 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r10 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r10, r11, 0x0, 0x50000000000443) 00:23:11 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000180)) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000080)={0x0, 0xfb, 0xd8, 0x2, 0x2, "3fe035100a4af157994f600a02fc0246", "fe47346480c6a9599e68265b060f8a9f55cb7ce16629d1fcc09e17d9a5f84b76c13ac05ad0464dfd994e383abfdb6ec28b5707c5bb957fbcc9c0d91b38cedb021425d47ffd1ffda7ebb6c806297915d356bbf5297f3fb8293c8129913b00d07c469632f496e6e82c90d8086189018dd4d9f03b4ca67bacb7fef83e3827f5c0bf938c9ecf4e0990c29fdfd28b6aa638756679b3d0b4307bebedaa938f1d8f343287898bdd06c9c55ec76bac8e1902c516aec66ccc7b0655a58554d3ba0579ea5d353335"}, 0xd8, 0x3) 00:23:11 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:11 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 396.391701] Unknown ioctl -1070574846 00:23:11 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) ioctl$FIONREAD(r2, 0x541b, &(0x7f00000002c0)) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) getpgid(0x0) gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f00000004c0)=0xc) r8 = syz_open_procfs(r7, &(0x7f0000000440)='net/udp\x00') sendfile(r6, r8, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r8, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r9 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r9, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r4) 00:23:11 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x240000, 0x4) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000080)={0x0}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="380000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0fff0000000000001800128008000100736974000c00028008000300", @ANYRESOCT, @ANYBLOB="2e4728a7fc84104821569bfca79525bda3eccd64d4b77ab2b9dd8d9509e44de0adcbe5eed7e1af163084e2839657dee6c9c14cef4b361db9dbbd183336153fd990b9a14493f61054176d95c14c02a8faa96624e98218a5e2fce1328f56fee8a9afaf4f11"], 0x5}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r4, 0x8916, &(0x7f0000000100)={@mcast1, 0x46, r8}) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r9, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r10 = dup(r9) ioctl$ASHMEM_PURGE_ALL_CACHES(r10, 0x770a, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f00000000c0)={r2, 0x80000, r10}) 00:23:11 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$DRM_IOCTL_MODE_REVOKE_LEASE(r2, 0xc00464c9, &(0x7f00000005c0)={r9}) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r10 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r10, r11, 0x0, 0x50000000000443) 00:23:12 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xc) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$USBDEVFS_REAPURB(r3, 0x4008550c, &(0x7f0000000380)) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$TCSETXF(r8, 0x5434, &(0x7f0000000300)={0x7, 0x8000, [0x1f, 0x3, 0x1f, 0x81, 0xaa]}) r9 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCSETX(r9, 0x5433, &(0x7f0000000340)={0x2, 0x3166, [0x6, 0x7fff, 0x8000, 0x9, 0x101], 0x2}) ioctl$VIDIOC_S_AUDOUT(0xffffffffffffffff, 0x40345632, &(0x7f0000000200)={0x0, "24ecf7b35002ecac460dd974303ffad6eceda8a7d1015c1e8a91c5484d5354d0", 0x2, 0x1}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r10}]}}}]}, 0x38}}, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) getsockopt$inet_pktinfo(r13, 0x0, 0x8, &(0x7f0000000080)={0x0, @multicast2, @empty}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000700)={0x0, @can={0x1d, 0x0}, @generic={0xb, "ba07078fd0f5786e1eb03009eb3c"}, @llc={0x1a, 0x33a, 0xff, 0x1, 0x6, 0xbd, @broadcast}, 0x9ed, 0x0, 0x0, 0x0, 0x9c, 0x0, 0xfffffffffffffeff, 0x9, 0x6}) sendmsg$NL80211_CMD_GET_MESH_CONFIG(r0, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000780)={0x4c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, [@NL80211_ATTR_WDEV={0xc, 0x99, {0x7, 0xffffffffffffffff}}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r10}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r14}, @NL80211_ATTR_IFINDEX={0x8, 0x3, r15}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x1}, @NL80211_ATTR_WDEV={0xc, 0x99, {0x1000, 0x3}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) r16 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r16, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:12 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:12 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 397.248013] device sit2 entered promiscuous mode [ 397.287210] Unknown ioctl -1070574846 [ 397.335045] audit: type=1400 audit(1580084592.365:70): avc: denied { write } for pid=22323 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:23:12 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) dup(r0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$addseals(r4, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x46d81, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r8, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) socket$alg(0x26, 0x5, 0x0) accept4(r6, 0x0, 0x0, 0xc0800) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r10 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r10, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendfile(r10, 0xffffffffffffffff, 0x0, 0x50000000000444) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x19000, [], 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f000001d080)=""/102400}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r11 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r11, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r6) 00:23:12 executing program 0: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x20000, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000000c0)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000100)=0x5, 0x4) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$getflags(r4, 0x40a) r5 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, 0x0, &(0x7f0000000040)) delete_module(&(0x7f0000000000)='nodev3vmnet0\x00', 0x0) 00:23:12 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r8, 0xc01064c7, &(0x7f0000000580)={0x5, 0x0, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0]}) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r10, r11, 0x0, 0x50000000000443) 00:23:12 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) dup(r0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$addseals(r4, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x46d81, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r8, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) socket$alg(0x26, 0x5, 0x0) accept4(r6, 0x0, 0x0, 0xc0800) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r10 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r10, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendfile(r10, 0xffffffffffffffff, 0x0, 0x50000000000444) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x19000, [], 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f000001d080)=""/102400}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r11 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r11, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r6) 00:23:12 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) dup(r0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$addseals(r4, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x46d81, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r8, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) socket$alg(0x26, 0x5, 0x0) accept4(r6, 0x0, 0x0, 0xc0800) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r10 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r10, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendfile(r10, 0xffffffffffffffff, 0x0, 0x50000000000444) getsockopt$EBT_SO_GET_ENTRIES(r9, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x19000, [], 0x8, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], &(0x7f000001d080)=""/102400}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r11 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r11, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r5, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r6) 00:23:12 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:12 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:12 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000)=0x4801, 0x4) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:13 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x4, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:13 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140)='/dev/nvram\x00', 0x404002, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x7a, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000180)={r5, 0x4}, 0x8) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) connect$l2tp6(r6, &(0x7f0000000100)={0xa, 0x0, 0x4, @remote, 0x7a}, 0x20) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x7a, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000001c0)={r10, 0x81}, 0x8) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, &(0x7f0000000000), &(0x7f0000000080)=0x4) 00:23:13 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) finit_module(r1, &(0x7f0000000100)='ecb-cipher_null\x00', 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000080)={0x3, 0xffea, 0x0, 0xff, 0xff, 0x9e, 0x0, 0x3, 0x4000, 0x8, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x64f7, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x80, 0x9, 0x3, 0x2159a0e35b5bb928, 0x3, 0x3fe, 0x4fc9}) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:13 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) modify_ldt$read(0x0, &(0x7f0000000080)=""/86, 0x56) 00:23:13 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x60) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:13 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ocfs2_control\x00', 0x200901, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000000)) 00:23:13 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r2, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r10, r11, 0x0, 0x50000000000443) 00:23:13 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:13 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 398.735643] Unknown ioctl -1070574846 00:23:13 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x4, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) write$FUSE_IOCTL(r2, &(0x7f0000000000)={0x20, 0x0, 0x7, {0x70, 0x0, 0x3465, 0x7}}, 0x20) socket$can_raw(0x1d, 0x3, 0x1) socketpair(0x22, 0x80000, 0x5, &(0x7f0000000100)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:14 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r8, r9, 0x0, 0x50000000000443) 00:23:14 executing program 0: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x30140, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x4000, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) 00:23:14 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f00000000c0)) 00:23:14 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:14 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 399.565591] Unknown ioctl -1070574846 00:23:14 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8101, 0x0, 0x4, 0x0, 0x2, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) syz_open_dev$swradio(&(0x7f00000002c0)='/dev/swradio#\x00', 0x0, 0x2) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:14 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x7, 0x0, &(0x7f0000000000)) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000100)={@multicast1, @rand_addr, 0x0}, &(0x7f0000000140)=0xc) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000180)={'vxcan1\x00', r2}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:14 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0xe9, 0xff, 0x6, 0x6}, {0x3, 0x6, 0x1, 0x2}, {0x9, 0xe0, 0x7, 0x5}]}, 0x10) 00:23:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x7a, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x2059b000) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r2, 0x84, 0x78, &(0x7f0000000000)=r6, 0x4) r7 = socket$can_raw(0x1d, 0x3, 0x1) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0xc) getsockopt$CAN_RAW_LOOPBACK(r7, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r8, r9, 0x0, 0x50000000000443) 00:23:15 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) sendmmsg$alg(0xffffffffffffffff, &(0x7f00000063c0)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)="74029b54aae7ded0fb5002cfb99f006f19887bfd909a454e075413f2abea067e7f992be9d03a2f171d15ccaa9aba4fbdfdf09b53084d2a2e2850ce6989a1f5cee79922cfba0cc8654f41403120bcbf24f31d45837b9de1cb3462e5165c82d86ab8e97eac1423", 0x66}, {&(0x7f0000000100)="d36ae093bb442317e2e7b820febd8840c85be0551a0637f989ac8b368c647f2c9a20288673013fc000667e1b47eeda218391e933e839ba410a0b8f0e2d9742606dfe9f44ff2776f4dcede05e6ff42e4c5ca84cdb64944e377bdaa758c3ecf284170d34c7965efae169f27ab98310aaa2f61c8218eb98c8a3d64e6242b287db042f8c18cfc06316aed3106c80b3bf33d555fefbe73176e6bca07b5a38099662d61f6e936e3a8551bba80fe1695fb1a2c487d02b77e48c76aee57b2a151715177e09f5a31a1dc968a0ecbe570626cef4d16aa2a3213f", 0xd5}, {&(0x7f0000000200)="4a2b2b6b24bea3d7de545fcf1951ee88db53277e7eb6e474fa9c76c3deb3ece0ec44f005abf91d59996b28810f23cae1807c60043cc832eae4e0333274abe026fc47cdeb03b99d4488d0e325300cc6e44ec9540cc75681c2143ef47a23987b0d674ac9766c", 0x65}, {&(0x7f0000000000)="50a44192a8bb2c8ec4b5d6a3641fc76577b67037f720ae89", 0x18}, {&(0x7f0000000280)="46cae0a8e34bacfa25e3161f038031b785757f1e2413b40f8421bc08a809ac42f6ac7aeac0f422b4a59b1d3f7128b842be1eb6f6206f34cd85efb6991f8d8c5ea194b195b847fb40b49f938347ceff98d60a84a96fa550c917a8aa111fd3b96bf7d7823bb6c70bd47bd29786fa544c609328c3d26ce4007af5f2c0b42910cf432864c89856", 0x85}], 0x5, &(0x7f00000003c0)=[@op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x60, 0x117, 0x2, 0x4c, "5f794578177fc6f12330fe0f5c4eb13477c95616c44dcd745cead48a4bfa00726c8c1612878da2640c6a4c9b3354e648b78f7bee8231a9d1c14f4f1b1531e2ee13f259851bfef45f061e8361"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x4}], 0xc0, 0x8040}, {0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f00000004c0)=[@iv={0x88, 0x117, 0x2, 0x74, "150c70caf92518f49acf57492c7c1b379170ddd684045321713e2c01152c1a0fa9b00c6843e9f4acb9443c3a8386617d080f88c789e4869c6e52de569cde565e497cb8c76f566017641f0e78ccad65aa750c6eeace96c3fdf16094d7a548eecaff2275575cc2fd09c17cd9185f76a38b7a124e72"}, @iv={0x98, 0x117, 0x2, 0x82, "2532d34923bf149b3a5c48b78f131b04c802f8fccf3b58096f87397c50f6e7989dee55c9f87e4f8f0d82e094251e518be823baf3e780fe683b6f0104995dc1ff123905a3413aa23afbb2ef86ffeca063790a6710a634dbf02e8f226371736a282650ea5ab1bba89c97f3fcedbb74d9b908c04373c173d70a86d0b32e9d0217baa1a1"}, @assoc={0x18, 0x117, 0x4, 0x7}, @assoc={0x18, 0x117, 0x4, 0x5}], 0x150, 0x810}, {0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000000640)="926c7407c25802d87b038abed75c4133d83ec8d93da198aa4121523121f2fe5e720419309a6ab7c0f739b75e1b026fe452d9ff3383f59eec129371fe580ae423ff525b2b8f1dc58e1a8f466fed5befcf2b92b4b5ae3ea6489d5bb9bbbb68f24b31d9facddbe1211d768c5e3a1b7e4c952654451e68f343195487eebedd530c63158b76adca11243736c581bff2f128fd14981ee5a87c50e5ea967d9812d3d6db81786b30a3fbfa8e74840b902a10880f286cfc71e0fcb5da44d91e14d1283450fe501a28b073cf5d0ae10599f48f193f5f658cd63b027ff4603833590b8a00d2e110a8e487dc05683a88ecd8f39dfcaa00b13dfa51", 0xf5}, {&(0x7f0000000740)="6bb590ce8a319b8463b2ce3c6b60e7fe54f5386f9e899a0160de08a85ca8a0b967f7f10cef802d03822759de0a208fab9c9aa76d2f1651057df665ef5d402cbb0656eaf1a6a79bc3ce1840576bb1679c531357dc12cd20f093ca4c804383b895e664bbc28a24ec5fac0116b809d0afe4759e71e6d5cb11a2589a1de4c2889a6659b00fe49b99865c1eeede2aa5046195f7ab23cd153c9d891bdcfbcc0ee1754446ae922f259c67346bff66b4a8a66eb179c23bc687ddd2f950d9d42e2eadbd77678ce38134b68b9a5d9a5b05f3052f8923679933af0c857d078d63352d7875c859da1d5ea2641752bbb05c746ed9f1d4bd59b682e9190de067072ffa706f00c05b2108ea412e0dfeae990efef96402f4bcacf0320885e38b0b639e6f9fe46a4f0efa29145fcd18bc65d15272d082f88a1318b299a9877429f03e9b329713e1d21e5d0e7e78b6e605331af87ca9ffe18b3510944e18ce207807bf8aa0cdfc7945c23b243d1206c2b25d08d10ed9465b34987022921fcc58c59d75db545aa17af006c7cf93d8d32a84a671cab74e7a49929f100e2be60b7dd9351d21611f44f1742968aa7bd8f95f9ddc76088aead36f90d38c1e7f8b146c93c620b515f34fef0b0d337df72e792804d24ba6b00f50ca3303c6c6ffff804cb2efa3b9c3f8361e841012267686bc6f9a097d3b2d4751b0ac8edb9a0f50ca612cebd99504f1bfbfdb6b3bf1c955c0f48f59d237d2f66afe744467b233fbca3e366baa0beffbaf3e46cddac1c25b3dd5e2db258b4ee36e41753014931ea4790c7822f2a78e754f7759c34772be24aa59553a9822220f9d7b1b5a0b35011c7560e6b670144a4598184c41c6de1e7fb352842ad6fbf500b5facd3afbabc2c7ac08239165b12db679ffc32b897d12134ccfdaecf654e574e94c168bae35ffa92ad8a77a0c6027f87b364fe98a02b4d381ce4cf175758c1287e045888045bc49f8e9f36728f74c0da26856f48e4fa9a478731995dcd9bee5a33364aa7e1952c2401c809eef2f6938a9b624e413ab629986dd6aa0cdcd5fc85acc162f34df3bb324458a77044a490fbd95f65a210abfacb7ffcc2b518e3eaa5f71399ea60179a628b945682d00667fb3e1650128e9e6e986659cd0c6affef42a3862ae660d70cee1bbdd703f5bb8c658379b504e733682bbccc7287f661667662434b27ac95bd7318ac05c699392920f5ed73d63f677302a730f80c56e0eae488cd4f932f8e7a4633e5de7c9459ada6b0409c7640f0b90e0696df4e3d781b0af0413dcdd2326998776c0188829ebf856bb6b73992cadb68f2f0cc172890926da076c607dd81a83f3fad60b7c1542898bcca381acbe57c30caa46fc3936d09368d601c717216e75fc3d118e7031335f5f943a2b7911f225ecc4c3f268a77ee3813b5634f33e916d165f1288c22feca3b9cff57fd9b0b73513c12101808e341d7f4e698378a195d3184bc6ece066818d996b7f6c1b9e30f2cf2c8b900fde0fb649e6e52cc728e9673638543f8a8aa83513ae4974d5dd942c3e7cc45bab6da30a7604c577ea5dc300e4e7b7a1be8457d526429070a4431f1bcbc0e492943c89fd9084a23ff096f1416e60dfb98bb56abded8e59aebbf554257a451a83731728091ce0351e5b82b3849c588b609c714cd12708c75a4e9c47d0f2ddb1593bab388974721676a99b49231775e67cd6bdcea13e2749323e9b57ced57825ac077216f78459079e2d6e8504cb2f3babad67ec4a922b028a442934bb45d72a08e356a51cac761fe86079bb1cfe943ecf5290a0fa19d124e037a711133c625188fd4f417383fe5776c595f9af1e062849f8cd9bd785d543f8d222450d4732e0a3c69f4c24c1fe15fe866d61700f50cb7bc07816b86d6ecaf8d729c16f44a1d8210ce95203012ade7e541191b872c9f3c9a5f57c60a06d5fe681aa0a7b00b013082ffc2fb7475fe037711de948d410291192fabb3cdef685cb28d68077a60a31a56989a994f64f3dc0bc2bc435e057b55adf2bde8140b831839192056f5064810bc6b2d8b2f65cbb4124aa73795bb2391becce3e48e74cb0796c20cb739726f5acebe46b162e12207c2b253fbb0d335feef2a14c82fb8e216bad38fe656d39241e832f179c4ea608e0ad6bc2bc3205f0b231cf4ffbd718e9b9150e2f4a4c0a55b1585cb77a028531a1b9522b050e126ecd9d3fd8cd40267f03341c59055a65036180c96004ae869c5a194197414b59c150d4f9feacb8fb298f1078934d35d24233233e5c98f3c4a2bd366997d8cf57299a50f98c0bd2f7aab82f0c46a47a93ca7457da12fcaf09f0d887177e23c6c69df46fb08ac922c6ccfbd5a210b87560a139f0a2b10523c3234cf4113eb6affa4abb2f11bfbd4340c4139e515802b1a5b361c782365586062f1be15593e95707053f8f1e88fff486cc608544c63f394045ce5775cbcfcc8a8ba0105e623ad476e0806155a258a587c1db717f4aba0028b7d3061aab696330ad7cee61bd9bbef999c090cf013fa51601567cf53cb499e45e2b5e6a58c36eee8e93545f3147bf33872c6e27fef6a14bb8703c1120017d34be753fb4375d2648c5ac72ba2124359511b1c86d13f330b111e1834dfddc197561a4a67915aa22d8e38a09cb9592e274a295c4c338766917a4da65477cd33a21df27e9926d100a296d6f4e28bb65aba3ddc341f3b298d1f201c3facd25c555a6696393bcd54bc738c5536936121f0840db61b2065a1e73eebbfa76b6808357881c57a58214c0e721bf18242f0acacca56e595644e3d6c2e6ecb1c6ebd0939a6a10353cbed6d05fd5bd3e7e6f8c9b506352d8c912b2a9c55256b37790d50845051c490a0bea99a8e3487e0735b52b11b58296fee49cec2194b33f0ff4d00eff3f0460736882f79b61582501ef6e9867d3ff4af99cb240101e67fbb420d3c86db5e07211da3e2c09c2c7e3957ccc2e34dd23b0178c3632eb48b372e571208e5d59b394e0e00962993891bf4d450930e109279373f575edc20c92f9983915e29c3726fbf27b3d3afc9bb85d2c914c8be6a8ef7d67c260ae378a2da28ba72e15cbae055d8da1f7611f6e4c1b05920f701f16f73e5d91688e46f0c8d5ccfd8448f24b74fe9f0e9e4de216acf1630d8e50da81236d50328de6b892d9ee246bd4845e9719c634684092e0b2be74c8440e9759385e80e5c687f9972cd093e08f2701fbf19c427a7a18d66de89f4ac5b54785038fc14c5acac92eda6cf6e7d0603867d0c5174919343922f250b09494a2de2716057f947efc68777e67c1dd69c72fa8d8aca156c0c56b7eca9bbe785a165aa73e4d3641c8b333e4b4cb9e3962e036cc56ecb029cbc2f5996299c4a2d3a30cde87f71a4364e11fae799a8f0db489faa314403586fdccb9e3db519fe758c980d51524639422f072df86b40bf56f4c92c9bfa51e2f319e1f87f6fc379f5caccb63abdd5fcecba19427123050cf69026f28e680bb9eb7723c8a662a7ad1a0618f66bc94e038c2d885086587f01239e0e1c871b9a90d00be43981025012717e0d17f283c5a5bb9e6001284e176b941ee09643ec39cf13cbb124e315c7f3ac9f3ae3041d7534e48d4998bc429e3150046389f0e20e667ce6f8ab15099841b17da2b040d3f1e6d8dfc0bfb08df01768065357992263abc5255ccc84c3ba6404cf662800b2a846b69726f31d1204f35092f1f9fac5b96414db34ddbc7fc49a66e180b4882d883af0d68af172e16d8d396a4b10c1d8c578dace7d9ba0fd2c090fd22226176138a2e22b00cc902434d53072b92ee8bf596746f611c7ba14e97a1723b7bc7a7e25635bb68d10bcfa96f1d107c3b29bc5f7240aed4042e60a3f09d15723251310d142e942d60ff97f823130ab6442c9ee28fd2b4ff1381a41ee51ca3856cc771603711cf616c7a223dc78dcf46f69d2e2d9ae8fdb0482081d1fc7b4b505f297a3601f983a449583ff9314b374d3ba07cb5d6f35de7227ba1701b47238e961320328e37995c5642432a88a987eb5f899b270552d5ce8febaec754caba8efd8fb2f0a72083da4e63f41dce86cf74f85e71a86cfee68148dc1a706b15eb50b5222f6ea7f10b17e12847bee41a06a680dc0d99229ce4478ba168deab6d7675cbc7129d20d689155f5722d1b02a582ccbfa0e176a4bf48e2fd665c0bba76a62d3d13bc2375f28a246d1463f87fa81a908d1b3580b21f8b10234a5944c43c01d5bc320d7a2d722ce837dc9efb0a42710164791669412fa4e113c5136e07cdd8a8c59500277b2c326de9a35af145469354f2b6c8f8f68b0efe962775add243a9aa9a17a8efb658991d85a50d1a1657dba7945aa36d4b96cc02faf83bacbd2adc6b4f8355cee98cbe2f0870392835428045708cdca3f8ef5dcf466684452a089586a87c5f682be39d6e114cd248195b9c4f23b534ee2e3db95297fbf735798797ea53a35c5f6b5d37f0c0d06fd856b5b23efc44315d5756196c831c2cbd9fbf431ab8d1c2c07b099ef43948169542bd3abee5dee4c59732b55ddac93c811fd21bbacd6259383d4bd63bf00f7b5f6c5d78902802cd2038512767d0ece90e6f6138df28aaa36071989a7c9304a7d68e3e7712a794f78644fbefb8992508980adc749728c5a1c95b7c2071813809e8ae7a86f78174fe777e613e0a180e9cd50868fe4fdf70ec2c54bd081fbb80ce677eea175c46600ecceaa3a8dc039fe416eb6d8b00caa53be6569e7cdbfc6a8a7cdd589f1f352dac42fa298df6494a6e8ae26da94ccc96904db0ff0625717a430d121e67ff599b560de7f6f81f662e5ca9fcce618ed6d725448658825ee6979f1bf8ee6b41f21f00bb8549df5fbae7e2145a8faf13710f6d14d6ed1b7d90b5b4a7460e654bb46b4227edd7e28dbf15bd5340fbad03ba04e956ddc4e79b9d2c9624ee07119191e7e92926955063fda7062cae1158dac31eed4c40f9cf49ec4ccb2aaec9d936aff24ccd3eb611449310ef6ebde58b3393c16704eed651d53ac6400b4d9da924480a4c5678945f1dd7dd43c46f44a7b41b4da8746a0885ab1e8c070c8d12f97b6b04f1ae4bdfdd3b6a14d5929370bfc38e43da3c3f178bd0b8929afe595c7eff79d11e7d160b7f90910fd8923aa60164b43545276f2c8777a9a44ba3c185c29c03958f96c8cffd9c5cf7182550cbb8f217027b0c5681148dc473386301d875f5e97a3460eb526b7d5712345c46c559aac547edea484368d7dfe4001766dad52f904db3560434bc61e4150adeafeb951db813d37e0b7b35f3da816dc6bedd3ac0c8eef3178497277f9794520fac85e17534fe3754765e9621446d8f5ce25050551ef47c34925a565266090a6ad9f1d4820862c2b7c6cdba4a8ca9b6321be8a4611278870e3794342c9e67475fdd59486696914279925ed05f1d433ca011e7d4cfb6d87dd0d591606687f78a667db5f212260e756346e65c603011fb63c11a93576885da2f382ec02505b13aa5daddf397b52b9a79e9367cf0d8aaf8770cb1ad92e9b2bcb388ad36af763679440ccfd5921cefc1d443d0dfb92d2b6e870f6817ff6215cf65bfff6d181da88a23d09ce930ab15609b0f682e57e7d18f11b4e5e48ec8718ae813c649a2223e6ef285002791b6308b74550a5a3ddc37222cfd07eafea90e11cb75038aac22272b6a95206c11a7ee33797006e60e0736b05afe07c7d39435b9bc9e55ae41192681d9ec9173c1647c194321bdd7e7182ab050794f3d98fd5a9aa09fb95b69604a0cf72dc8ec5e65fbdf64d31f3fc149348c356", 0x1000}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000002740)="04bc2ee97c26d19c5c5f62e23223a1a95e726ea420e83b4a6ab1faa47ce89944951eec616aa078ea2d6c72eb8fe2f4bb58ade8905050a31e02d78d311f5531f9", 0x40}], 0x4}, {0x0, 0x0, &(0x7f0000004c80)=[{&(0x7f00000027c0)="4b1de6d65414f3c49f4d752922debbcbf0c98c4d637ba0a542ea8e95736790fa913d8fd9ed33989d233ef6407a1f63b868bdbc16f2485791a6008a3616aabd393a96e4d1df1486d3e7bd7e4aa8baa42a44d6f168c694775816ceb143fe7dffa88bbb320bc7deff9a0e9cae760ee52b6c520ab24bdfad5d5251c3074fe3635e52ed83914bf99daff94423fe61edabd4ba8721bc66af8c8aa0091692d562985ea5b43699773014e5ad4b2e4682084132bbd6791b514699cebbe2da2304830ff3346a09c4a208705564335ca512fe12918989fda815ff1a5f81965f1cb70e8bfd63743a1eb0615c4ebe4bd33b77563141d6cec827a51fb4e873728155313fdea2f1960f089eb29a2888f2dc396242005d645c7392c7de6322c7bf988bdba274844d2b5ea86cbcb3b5b1a3fd8602cfe21f89b0ea805ca4016dd63d560caf9bea850c8bbf8c3bec18142e472d8cfeddb7d5e6a0938b132eee63e1b4431102bde398e3feba684c081f8d7bdecb962ff992b38d4c61e94bdf28a34b9907737d43de3fa453a315c5addb050d6993573215102b2a61d4fc8bc33c4115aec6555193d3d6b9f965791b24211909ec91cd480d995d72faefbfa73092cfcd8f5782a241a87bac2f54d53cbf86cedec1b16ebfd7c5862ef80d9d4c8fc6064aedc021e6020acbd401733120d97e03888ff6c447fd144865c79c690431029325647c594bee60d0a7955887e7fef3ab213544bf7d5b576ce122db2fad4dd9da2c4421c5b689149cb9c3be56c4eb7f0c81392e3dacc4ddbfeeff2502255555f84bd08f5ef1a248cc4df523d6103f99bdc68325e75d003e0888e419f0ab901d1211a12cfe79b10c8220048669e02722b3032e296d33e079af88ac8b07cbc7a9c5cf656d600a97898d45cbdc3bd67f77c6c68a9048ee9ca797a8610fba080d056dac0df3ca6eddd24a66c146a5db9f490f28d22c10fd0b38fd1a8febce40af9c792fd89ed5ccc50c41e82d2dfb8786302dde6a3dce91886c14cdb7e1a0b4ea1cd91fa2c8005122351873b28a5897e93ebf4b6eec210f91d6c453f6bddae0ac631e0d9e21cb27df5bbafc9b6013991917afdf53abff628c201ca720b1aace81ccae8efc5849428c4f8cd7ebe77d381ea33d0e89ea34c3c81a9d26b76cd455df4a01a2e056e54b38c14134291dd56481a314441e0c07b422e41f9b161dc9f6c4270c2f47d957263ca32f9f97ecb7a346b9a605eedb8f417a0e71de94964e48434ae9729bb9040fa864c7dae655f7c47f7d5a68ccec6f30ecb7133e304c39e0d8ed4d031d9640e3d822b32368ed4aa6212133b5da99f2a726b2b9ebf94d59d4ca032bc46be32ecee1a31cfbd5f837d7603c1758fa6ecece5e799a8e491679dbaf297bc6e6ddbb1170c7106771cca64e90ef2942b3fafb15624e607947ae151cd42a536e11c33db5e2688fbeb870d8fe01c56c0a9f6c69d8c03cceb5ec5b08442ce9e53e36d64e400a07cd4bfbf5ed69554fab703f6a182007127d84e488330dfe25ed2bcfaad036cd94ef9f99e88dadd3e3d39099a59ee260802608d09322076615c979c07857f515f28bb4f49e05c7e9704942740756b27ea985517ac79a047c20e5ea26b391185517c8359dea5b39c74fcb23a0d966c9ed6753c600e97a4d1978c82bf82bdd1178b9050861065c797995b3d12904f44021e1aa973c5999dbc43433d4e1d813a3b3a8d3bd72622d81f67d065aedd9170f47902cc886ddc4ff80250c7dc55a786558ecbe656b85edf95275f005562ecc58b8077072762cd5b453fd9b37367d69d8e8acb421bfec8ab566e452269a22c149eddf831faa87b0889a7bf444a974382fe50124fce2e8e28e7459c74f7c0467d6ad1ed5842d9ca9d7862e6e4d393fbb3b551f86300f3d201c4bbd705b17f1ba620d92e7e55d73c83911f1f172b265cc7d3e1b7cc169e32c3c1f15f41d25c0dae4163199ab669e6c869398fe469bbd4ae3020a807038f7ffb8a7ba2f6fd45a765a32f33d7fa171403b84c9f2ab7a85259e8a2e9b7de4d64dfcf12ebce737ffe0fff698551b262afd20a186c5fbab812b30e451804284f3fcdf946a3921af71198eb225876854c0aa71cbe0efa213f2e8bf740e6a131e7ea1437ddb8dd969358a651d6b2aefb1a465c5e6a0790e9c9611a57a6c2ad85fc1d3f7d586b275d128248f8ba298ad6f19c154b991a8be09c9f0a2ed0adb5817e25e10c5b2d4efb3774397a880906e135bc392b7ef1fad2d3816d89ebe854751d4ea39c7af71214734551d89b599cdde245af4479f2b821e55a69cca9d50a0553672c9ff7dfc90de1c3e8cba0dd0681d7127592504542bf37301e4ebe37d95a15308c2d53e083db0b3dd52f57f8f65f96c04fdde95e5fe1aa49044ef2292d7672f1f131f58598b501868851eb0376b1006ddb411baa77c5f8ff5f6f1814d49ba2bf2e691eac83a020234aad969a3fa091ef879007a555fd541896fa67a5a2453b0fa72c09703907b7abbd627c7d46bfc99cbbbbb450685044747031f22748cf50e1dde5b9a72a31390d6338625046731f99c982b095a944ee5cbd8385f600a109d9bb7d1bfeb959721d938321ad36136dce2de36d1309a492bdc9c8367e5fbf400541508a8f475dcf990cedf0e30fc7426883d3763e7a89eb10d3eca3ed759ba68dac0d899c6c6a4df9f947c4dbcfb2706be0d45f4c2a505174b238ddf09b251ffff9cb3ed53d12f5b49ae03c167ab314a2a8ef1448c427d6bee33717baf9ea3198950bb4ef1fdefd4069dd6d608ef4b3068300510ca0cf01d96a6a09a72a04f3d42fdca05d8cc3d3a730b288b2db3e727b1857f8f3063f74ce536b45ad9dcf208d7a0332fe929b94c9cbc62e4fafc9693eb7f3bb3437e16a0184504c244b8414995bde9772d3e85e5463d9c743e9ab7f22ebe6520951d243ec1ba850767885a2dd83103642a0a0568737efebfc7b4cabb0e6797c161ff887fe14d469d2df1e0d71f5fb9c3ab9acfd491f907ae56979f59c63bb682b6910ced9e0b3b0ae690be471e5ec3ead8b8d0c34098e062ec46727bbd93518057d09095828c9e57a5d4dd851784c019e3751c49aef4a31e4d1d0e1491b78bd29b800a4633e76c8909b87f1b84f23d6265d477d38878e80b498ec3fd0dd0f0e7d00f529670d13b27765e26bdfa68ae02a1a9282ea950b370038f12779668011f30cb3f3e1f5feea520cf06efe986c487cce117d59edbb544bfd248f606b535192d03ce4a908bdef4bc622bb6a70ad7953f94967e2636f63b2d55bf1ffea77790f48dcd7adb38bfe9bdf8c5a9d9c0a92d5a981f58e89b24290170a652a7d9ab58c3ff4c8fd71af858e41a65c52ecffe9b52dd79445608141b09298bac92dba5c049b0e116d8b01c7b3a4ca5bd3821d52825c922e32125313f7118895be049671e7f279e9c9c78f7406cfce30e328f533c16eff169ceb5a671b9dcb0bf634d56f0b32da1f9e5325c8919421e632a9a60804877799a1413f69c857ddf0858bc55250b0485841153b6bf6503f79ebde669b6ae75eff12bec1ef7229e65e4cb3f5c70a7a6c07452372fbd23558f1113495554f0602789ec222056505119317ddacb51ca4a4c0609105765e262ebd247c20326171dd7d5e86762e7e4079294e6ac1ba2a12fb12c25c7d168dc7d92011cc8ad505c31c7408503c4ed9ca51f762f584fda9152e4058e9df5fd05f3797df3db0895817d4ce94b39fff3547aae504469824119687d91895aca59d44a7321697c53d2fece95285374245a15f13fd47c9d416b464a08e39ea62c99c8cc46628ce3ae9229858f121a9a38bff537b8f275ca51b53c9f6ed2b71552d36399b4d01f1d10018b830232f3ece0b320b99ce49ee01c1711546518a6501ddc2c44c5fd661ca62ededbc8c61cf2b5a206d77fb4320e67c1863f0b717eca44c4cc00237c698b5940e5c4ef6f69f6557ddb316921c99e1cf1d4faa65a7159ac2a0fd06d9e23bb3d3026411dd57ef11ca0f3a65ff9a238aad43669b448a6238ed9450bc48cfc94aebc4bca5e5b7dd938d5f8eef428691de7dd1b9c70e79f74a9e4bca29509fdf4e01cbba92883e044e1b4d04eea803228f5369950c8dc75292ebb557f30555b1bffc1d6b0e7a3c78096f8ae936971c8e10c485fcb487061135de253db9a199425cb9c0366a3f17ec2cf2d0a6e1fed3b383b72927514662c13f31cda5afce6c17365a392b5e3c5dacc305bfdee4546abc5dd5ab16c99dae30f681a00c676d405740941e03338863dd8908ff4b69fa547cd3a25557c78643f1433219feae6b243854b7eb078a9da26253cfda07cc087c9bf7c0d6e86bed5a1c67f6fbff99493bb291f65684e95bb6e67f532a7eed8c65a79e14835abc52e2835b181a4ea441ce00cee594a255bdf35c51bb177aaf090cc590556620b3eb192ac975b2a87000772bf72d83e43265d09c0cafa36d6d413e4c845aa6608af319437aac417bc203243364e0c547026b143d71013c2e814170177bda1f187dd0c6b99e973754095863a7531697a270bce742500f9877351ca71e3005defe86b328e74c0d52183ec12c844cdbdf0de5e5fa02b07479788ab405043b57f0c10476d1fa52505a67010afc3ff97dc284795ed4f076a7e0c3f9af27247df4f8ce917d62d6a71585b3a182b88f56063aae48e93ff77d4295857dc5b7c953b881d1f4a60ef79f99f97544cdfa5dac0079070b9b1c18279a0285bdd3374d74030bacd673c0b8c4422766dec3ee201a7bf24fd72e221ded8b859239f762b47cd75985697daa97989e7b19b26591b259aea1b527ba8a7e82a728d93a8caa58eb047d2e59e97b6b6ead9caa374f8cf22f96bec83de2e23b0d89d6a76b6c36aed0b857508b9ccd5d2b1561e877410abb033086b4fe25ae5a36ee1626969ffa321534d06ea0eab431d09bc9c1c7c4fbe52ffbc06176b4c76702990240c041f3abd7a660db8bad389cee65dc7c8dd075b4f048b2ff3b40fedb69dd49810e2d890cf47f7a771b8f600ade9be59a7582e183ee3e2b52fda9698fc987bc67a285363c467f2d9be4bbaa7f294ae83543e9dcee238cd3d01e4252c20d5f68edc9bf8a4833472742a4b9cc12a9d7a669e30e3a77d192164f254a5149b1b39d81512340c1d27fc3b9d62b1f754ff77a23fd5e3fc77c57eed4130beffe5772a647122f01897320871d9271d6e2657e96b222764f3c5f3199668a00cfeace892c8a369cf71b06a2e17b2b20763d5317c88ae9396cf594655abd1e8ee92f18429000e17406ab0079614aa0175077cfe98686271dcbe16f992902c47186b0e184092702f611804fd65c4b649ff842034404d443e475589c9ced7336afeab9ae1a945dbdfdf7e19f0f6130cff1fa8d62a13152d961c4ec139c11fb3402c1b00a77131ab71ca12189bd2ca2161690a58d2b9ffb38df197318157d0381debe6ae3a2c362f958ee1846144dd846e04ca52257b669e8c5ef73c5f5dba0a179aa42ca8a9b90090a32a87cda50b7cc8810f86f47773f1419b296c81d1e1c9316129cb7e58cf7f9a517837ffe39d38a21f37f9850e7fb051c7cbd99fc3782b8be99fe8c67f4549559c3b34f5ade6fda4ac9842ce5effb5e14cd1186f8f2c8a95d3e53b8d8a9f2725bedd9ccedfac42ac91681bd836c427673366049b22e99052a85d31ee8c2c112c176a6f5dcc772ec3fdce56e8e2e40769fe831270e9e9a2e46daf5cbe9eb70307a835610f3fd7900040d15df00030baec8b90b2225c46f667e4c216b88c7d7f2c3a3da10e3fab2d5e834a25bc438dae", 0x1000}, {&(0x7f00000037c0)="12d4a2ea366dd8d934e9f6c504d2c7af12978f108b0ca7bacd0b01f4", 0x1c}, {&(0x7f0000003800)="dee610903792935cba6726bd8c48771c2e3e3406ce720017488eea0150122fa8e10e6982d5e512607ea702baf29c44a460905e5a902d84d954be7902ad0e1d6934b1053ce4825dce400def13eb1ba9f64b004c14edc4c74c133d622d1e752dfd1a55565aa03aa2b948b47ba77412e9ee69f815aa2d8e3b8c28e5b330c9750a2136a31abc21dc00ac77df463ca8e71880ca980c0dfb11adc1cfb51b5aae547620dc5e88f334183bc2aab6e8b1854ed7daafee41889c9baa4743e1d9464d4b99d6017cb7ba11bf7f92315686f10e48fa563c97483706476c6e61c1af21efee5beb5037339e6cf346ca9162664fb4bd0f1334", 0xf1}, {&(0x7f0000003900)="583435f2f90d75363b034c285178e16ec37a8ab7419c7651ddd3f4b50acfdc249d37b13c33e57a3ceb2264c5dd670053b90e9f1c18efff1badc2dd42c17ce134a4374f1db95061016e7f8ddcd5e2e82f92ae186a888eeab031429dfeee95f5e3c153862721658956b27779a132aa5e061e045f6b78bce61c2dae185784e7fb61d668bcb23f3c2bef98b5ae125aebcaf6735ef06558a63d82", 0x98}, {&(0x7f00000039c0)="83593586b8f4c3fc38a5fcedc5edf9afe4596a5b853886fa4ca9953561a403f0b155d20c6ff0d9c4d3047815e766679aa8f21e7e6d12316e8f83d16c796e73097773d05b63fcbd51e7ae0a8c4a19767b615ad7b931c759efcaa0504ddb321b05c65bad03abcc2ff114207a454a561dbc9225a503613b3ca2e54eb8ac2c3943ac828960b8b8ffc4ba5c14319ca70bc95f84672d2c221a051c7352eb71f7bb185ca267eba7ac811892ea42d5328dc9a8f2f954951ecc6b11102852a247260640473cef6d71f8bb9f", 0xc7}, {&(0x7f0000003ac0)="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", 0x1000}, {&(0x7f0000004ac0)="b599b4ba9df8eb2c304ed4a4eb093718a52fa292f5ccc1314f70864c55194d92e1ca8d490b1fab13de8e78419d0b747e59be1dccdbb274e6b0256f05a229c5e74dfd21f7918d15d8b79bd6651079621069d6076c6c3ef033876d2b36822cb79368403a03169c5c5054036b467a745332ebbdd0db7478a3d5a6eb455ece864de7d884d10419416fbf2453eed4488593738983", 0x92}, {&(0x7f0000004b80)="7ec91da3ab0c22ca1bbdc1b0f961c764a6761d32f85ed63ea7ec576e7d24498ad50ecc4b0d108974a91baf843ce0b32926e8e54a9777f3dfc5422e2c156d282176575c5792b772ed279f1ab469d531d2521b47c91e872f5044cd2c9aa1a1fbcb87a5c7b13b1200d724bf592a2f0a5b78af096bfcd63dd1fe51f6a640377f28b5c0874e33140ac3da6a45274703d4c6dc5f04bedd348151d9e1b3da0e1ef9866eca9cb5788b88e6bd282351ec58014ebd24a56b028df7a0a4881a5aa0161dd35578401afa397783db9543b4", 0xcb}], 0x8, &(0x7f0000004d00)=ANY=[@ANYBLOB="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"/869], 0x368, 0x40080}, {0x0, 0x0, &(0x7f0000006340)=[{&(0x7f0000005080)="2f5acb0e", 0x4}, {&(0x7f00000050c0)="08c92706242ae29b398df8e71467fde397e7017f8d99f7ae9442e708aa330150fcea0f99caf85efcb28bec3972e18f6debcc026fec0f75b1e8fd06741c89672cd8675c6aeeb46b76d54b30001e320eacb3ebff1fa7c1bc17c1fba3ae86fb043e9a3216ebcb23bfb467e3dc6be4b3086fff0c854dcb32f9403246", 0x7a}, {&(0x7f0000005140)="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", 0x1000}, {&(0x7f0000006140)="f6a1c61ca402fb5c9b12893d25789dd7099b2e59f585e8bb0046c2f8cf253a7ed11098b9ee4f5c14a5b43471424e8cd47f0035538b0a4559a7c7f764477728d7c087b5002503926a9a82adea92694c16a335335609e82b1f5af9b81ecba59635114b3150e66a1c9d536b40e4921fcfcfe373065ebc49047a40030730ed443a8623724acb0e0c16d8801d8ecf13ad1ff37b77d737b04b6838689c5dfd7a38626c8c1e064729fde564fc7047ba5617265b114ee811b9d65ebd6f524103bc55fa40ec57afa2b9e614172fd6b4b5faf13b9a3a3dbbc392cffad118", 0xd9}, {&(0x7f0000006240)="64b96d9e2ff791781f3d04201e4850debb456846b2bf5f141a327eb833c23363e611c5cfed1d2f22295f81047325746c4a9de07cc164ee008e9cb287e9dad1cf26", 0x41}, {&(0x7f00000062c0)="66643db29bcd576dd92bf576483c82bafce51b6e8abc9d6fc711ddc8f769c4d3ae041fb7238227804f54c52d2e30378b7e5350dd380d0bda55d8ab132c05ecfaef55281d4c83de2a28b7a8", 0x4b}], 0x6}], 0x5, 0x4000) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:15 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r6}]}}}]}, 0x38}}, 0x0) sendmsg$can_raw(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x1d, r6}, 0x10, &(0x7f0000000500)={&(0x7f00000004c0)=@can={{0x3}, 0x0, 0x3, 0x0, 0x0, "c698b5ba7aea4037"}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x200000c0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x88, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbe7}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9b}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)=ANY=[@ANYBLOB="54010000", @ANYRES16=r8, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x8810}, 0x40000) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r9, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r10 = dup3(r0, r9, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r10, 0x401870cc, &(0x7f00000001c0)={0xfffffffffffffff8, 0xe4b, 0x3ff, 0x3}) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) r14 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r14, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$VIDIOC_QUERYBUF(r13, 0xc0585609, &(0x7f0000000580)={0x7, 0x1, 0x4, 0x40000000, 0xd320, {0x0, 0x7530}, {0x2, 0x8, 0x1, 0x81, 0x40, 0x2, "3437c543"}, 0x4, 0x4, @userptr=0xfffffffffffffff8, 0x0, 0x0, r14}) ioctl$IMHOLD_L1(r15, 0x80044948, &(0x7f0000000600)=0x7) [ 400.157911] device sit337 entered promiscuous mode 00:23:15 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:15 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 400.393778] Unknown ioctl -1070574846 00:23:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1b) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1b) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 400.576398] input: syz1 as /devices/virtual/input/input50 [ 400.649546] input: syz1 as /devices/virtual/input/input51 00:23:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1b) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) r3 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1b) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) socket$can_raw(0x1d, 0x3, 0x1) [ 400.729426] input: syz1 as /devices/virtual/input/input52 00:23:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x1b) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) 00:23:15 executing program 3: clock_gettime(0x0, &(0x7f0000000300)={0x0, 0x0}) select(0x40, &(0x7f0000000240)={0x6, 0x4, 0x1, 0x8, 0x6000000000, 0x7fffffff, 0x2, 0x1}, &(0x7f0000000280)={0x40, 0x7, 0x6, 0x0, 0x20, 0x8001, 0xb8e, 0x254cbcec}, &(0x7f00000002c0)={0x1ff, 0x7ff000, 0x5, 0x2, 0x8, 0x0, 0x100000001, 0x4}, &(0x7f0000000340)={r0, r1/1000+10000}) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rfcomm\x00') getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) mount$9p_unix(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x10028, &(0x7f00000001c0)={'trans=unix,', {[{@cachetag={'cachetag', 0x3d, 'net/rfcomm\x00'}}, {@aname={'aname', 0x3d, '.#eth1md5sumselinux-(mime_type@'}}], [{@fowner_gt={'fowner>', 0xee01}}]}}) r3 = socket$can_raw(0x1d, 0x3, 0x1) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_AUTH_MAGIC(r6, 0x40046411, &(0x7f0000000380)=0x6) getsockopt$CAN_RAW_LOOPBACK(r3, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 400.787640] input: syz1 as /devices/virtual/input/input53 00:23:15 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r8, r9, 0x0, 0x50000000000443) 00:23:15 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) [ 400.893858] input: syz1 as /devices/virtual/input/input54 00:23:16 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) 00:23:16 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000000)) [ 400.986516] input: syz1 as /devices/virtual/input/input55 00:23:16 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r6}]}}}]}, 0x38}}, 0x0) sendmsg$can_raw(r2, &(0x7f0000000540)={&(0x7f0000000480)={0x1d, r6}, 0x10, &(0x7f0000000500)={&(0x7f00000004c0)=@can={{0x3}, 0x0, 0x3, 0x0, 0x0, "c698b5ba7aea4037"}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x200000c0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) sendmsg$TIPC_NL_MEDIA_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x88, 0x0, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x1c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xbe7}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9b}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x8}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0x2c, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0x88}, 0x1, 0x0, 0x0, 0x80}, 0x4) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r7, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000400)={&(0x7f0000000280)=ANY=[@ANYBLOB="54010000", @ANYRES16=r8, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x8810}, 0x40000) r9 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r9, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r10 = dup3(r0, r9, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r10, 0x401870cc, &(0x7f00000001c0)={0xfffffffffffffff8, 0xe4b, 0x3ff, 0x3}) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = accept4(r11, 0x0, 0x0, 0x0) r13 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r12, r13, 0x0, 0x50000000000443) r14 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r14, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$VIDIOC_QUERYBUF(r13, 0xc0585609, &(0x7f0000000580)={0x7, 0x1, 0x4, 0x40000000, 0xd320, {0x0, 0x7530}, {0x2, 0x8, 0x1, 0x81, 0x40, 0x2, "3437c543"}, 0x4, 0x4, @userptr=0xfffffffffffffff8, 0x0, 0x0, r14}) ioctl$IMHOLD_L1(r15, 0x80044948, &(0x7f0000000600)=0x7) [ 401.163388] device sit21 entered promiscuous mode 00:23:16 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) 00:23:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) 00:23:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) accept$phonet_pipe(r2, &(0x7f0000000080), &(0x7f00000000c0)=0x10) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) [ 401.390448] Unknown ioctl -1070574846 00:23:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400041, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) 00:23:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) [ 401.454511] input: syz1 as /devices/virtual/input/input58 [ 401.525776] input: syz1 as /devices/virtual/input/input59 00:23:16 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$key(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x15, 0x3, 0x5, 0xe, 0x0, 0x70bd26, 0x25dfdbfb, [@sadb_lifetime={0x4, 0x2, 0x0, 0xbc30, 0x1ff, 0xffffffff00000000}, @sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@mcast2, 0x4, 0x0, 0x20}, @sadb_ident={0x2, 0x17, 0x7, 0x0, 0xd7}, @sadb_x_nat_t_type={0x1, 0x14, 0x4a}]}, 0x70}}, 0xd5) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) 00:23:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) socket$alg(0x26, 0x5, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:16 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) 00:23:16 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:16 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:17 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:17 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0x2) 00:23:17 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x2) 00:23:17 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x2) 00:23:17 executing program 4: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xcf) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x2) [ 402.191104] Unknown ioctl -1070574846 00:23:17 executing program 4: syz_init_net_socket$ax25(0x3, 0x3, 0xcf) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) [ 402.268897] input: syz1 as /devices/virtual/input/input62 00:23:17 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000080)={{0x7f, 0x45, 0x4c, 0x46, 0x3, 0x2, 0xfd, 0x6, 0x9, 0x3, 0x3e, 0x200, 0x121, 0x38, 0x13b, 0x1402, 0x3, 0x20, 0x2, 0x1, 0x4, 0x80}, [{0x6, 0x80, 0x7fffffff, 0xae52, 0x1, 0x7, 0x2}, {0xd9e36b111d8916a4, 0x8, 0x3, 0x8, 0x7, 0x6, 0x401, 0x3f}], "", [[], [], [], [], [], [], []]}, 0x778) 00:23:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:17 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x2a040, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) [ 402.614813] input: syz1 as /devices/virtual/input/input63 00:23:17 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000000c0)={0x1d, r1}, 0x10, &(0x7f0000000140)={&(0x7f0000000100)=@can={{0x4, 0x1}, 0x5, 0x7, 0x0, 0x0, "3ec09e5abef459a1"}, 0x10}, 0x1, 0x0, 0x0, 0x895}, 0x880) 00:23:17 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:17 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:17 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) r5 = openat$cgroup_ro(r4, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r8, 0x407, 0x0) write(r8, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000400)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000580)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000380)='9p\x00', 0x42404, &(0x7f0000000840)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@common=@access_any='access=any'}], [{@euid_lt={'euid<'}}, {@dont_appraise='dont_appraise'}, {@euid_lt={'euid<', r12}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}}) r13 = getgid() r14 = getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) r16 = gettid() pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r17, 0x407, 0x0) write(r17, &(0x7f00000004c0)="2d7c148d9e70b32cd81e4e4fedcf1e9312d37fd2558871e9d9996a597910ad9b00d5c2d8cb313252d9f9274567789d1437a18beea97369288e0d9a4a137ba8a931a80e137d6dad359a3b53a59282961c0d9779f0dc65c7d7c9b713f69ecb939a278101a1dcbbaea4afd3d4ce37b2a004b198cbedc9be1096154a415a1b0d7f0d28aeacf81f9793e0bc413c8b70a2139eff30ac4a", 0xfffffdc6) getsockopt$inet6_IPV6_IPSEC_POLICY(r17, 0x29, 0x22, &(0x7f0000000a80)={{{@in=@loopback, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000340)=0xfffffffffffffdf0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f0000000300)='./file0/file0\x00', &(0x7f0000000380)='9p\x00', 0x42400, &(0x7f0000000cc0)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@common=@nodevmap='nodevmap'}, {@sq={'sq', 0x3d, 0x3}}], [{@euid_lt={'euid<'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'net/xfrm_stat\x00'}}, {@euid_lt={'euid<', r18}}, {@fowner_lt={'fowner<'}}, {@permit_directio='permit_directio'}, {@euid_lt={'euid<'}}, {@dont_measure='dont_measure'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<'}}, {@mask={'mask', 0x3d, 'MAY_WRITE'}}]}}) r19 = getgid() sendmsg$netlink(r5, &(0x7f00000002c0)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x82000c}, 0xc, &(0x7f0000000180), 0x0, &(0x7f0000000240)=[@cred={{0x1c, 0x1, 0x2, {r6, r12, r13}}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {r16, r18, r19}}}], 0x60, 0x48000}, 0x4000000) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000000000000f486481910a4c2dbffa8b6f15d7e119a00000000000000000000000000000000260000000000000000000000000d6d83fa6b0732b60a78c4b1a6d020a17d3f276998a7f5a9047ce95a3c5c89a9937d00"/103]) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r20 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/xfrm_stat\x00') ioctl$TIOCNXCL(r20, 0x540d) 00:23:17 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x7, 0xa800) 00:23:17 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, 0x0, 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:17 executing program 3: syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000000), &(0x7f0000000080)=0x4) 00:23:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) [ 403.093761] Unknown ioctl -1070574846 00:23:18 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f00000002c0)={0x1, 0x0, 0x4, 0x2, 0x0, {}, {0x2, 0xc, 0x4, 0x2, 0x9, 0x5, "77af6c17"}, 0x6, 0x0, @planes=&(0x7f0000000080)={0xfcb9, 0x8, @fd=r5, 0x6}, 0x401, 0x0, r5}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:18 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@gid={'gid', 0x3d, r2}}]}) setgid(r2) 00:23:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) [ 403.479215] hfsplus: gid requires an argument [ 403.484383] hfsplus: unable to parse mount options [ 403.527990] hfsplus: gid requires an argument [ 403.533078] hfsplus: unable to parse mount options 00:23:18 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:18 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:18 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x5, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @llc={0x1a, 0x103, 0x0, 0x8, 0x40, 0x8, @remote}, @nfc={0x27, 0x0, 0x1, 0x3}, @hci={0x1f, 0xffffffffffffffff}, 0x8, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000000)='syzkaller0\x00', 0x0, 0x400, 0x4}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000100)='syzkaller1\x00') 00:23:18 executing program 0: openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) connect$bt_rfcomm(r2, &(0x7f0000000080)={0x1f, @none, 0x3}, 0xa) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x5, 0x212100) sendfile(r4, r5, 0x0, 0x50000000000443) write$vhost_msg(r5, &(0x7f0000000100)={0x1, {&(0x7f00000000c0)=""/29, 0x1d, &(0x7f00000002c0)=""/211, 0x1, 0x2}}, 0x48) r6 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r6, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 403.786223] Unknown ioctl -1070574846 00:23:18 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:18 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = accept4(r1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/snmp6\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$VIDIOC_S_FMT(r3, 0xc0d05605, &(0x7f00000000c0)={0x2, @pix_mp={0x2c2, 0x8000, 0x32314247, 0x6, 0xb, [{0xfffff3c7, 0x400}, {0x1, 0x4648}, {0x1, 0x1}, {0x800, 0x3}, {0x6, 0x5}, {0xfff, 0x1ff}, {0x3}, {0x5, 0xc2}], 0x40, 0x80, 0x2, 0x2, 0x6}}) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$sock(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)="24d97aa78d0d42ae092bf68b8bc2a28fc05c93d1b333d4738e6de487e776314d0dadf6225cb1882964944c047537de726354e8f6f065619d598a9be6f9cd3fa73b11f16faeaf844d8c3d61d3e041208964f2a1ca8ee1db13adc491faf00ff20d3fdd420aa8719232b9225f9ca123327f47495412da7b716ac6f824e7676a78fcffb7155cf457d15d4d20756533b4", 0x8e}, {&(0x7f00000003c0)="91f532f294832fa50294743e1da4a602d6682d27bfb19428ad2641c374c00f30ac03aeff6a3ed88021cda6b2408a09f762404d99fbb4413cba2988294729e05326a9e8047e1f579f50430c3ccfef03d1515ed2b170e70b91ba1d0a91fc929507f0ca78631cee334db63eec96653867b8203d95454d555f68e11ce1569ac1497fa6b8011bdf95773d230f29aedb8fba563a45bb88e59a4e446057ff450e777bc1f7d76a", 0xa3}], 0x2, &(0x7f0000000480)=[@timestamping={{0x14}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x6}}, @timestamping={{0x14, 0x1, 0x25, 0xc94e}}], 0x90}, 0x24000000) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/enforce\x00', 0x191000, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r5, 0xc0a85320, &(0x7f00000005c0)={{0x4, 0xf7}, 'port1\x00', 0xc9, 0x180028, 0x2, 0x1, 0xb82e, 0x800, 0xff, 0x0, 0x1}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = syz_open_dev$usbfs(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x4000000000000071, 0x0) lseek(r7, 0x0, 0x0) r8 = accept4(r6, 0x0, 0x0, 0x0) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) setsockopt$pppl2tp_PPPOL2TP_SO_DEBUG(r11, 0x111, 0x1, 0xfffffff9, 0x4) r12 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r12, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r12, 0x65, 0x3, 0x0, &(0x7f0000000040)=0x29) 00:23:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) [ 403.999048] Unknown ioctl -1070574846 00:23:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:19 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r4, 0x65, 0x5, &(0x7f0000000000)=0x1, 0x4) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:19 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 404.578737] Unknown ioctl -1070574846 00:23:19 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:19 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 404.644570] input: syz1 as /devices/virtual/input/input72 00:23:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:19 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) openat$adsp1(0xffffffffffffff9c, 0xffffffffffffffff, 0x2040, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000080), 0xfe28, 0xfffffffffffffffb) keyctl$clear(0x7, r1) keyctl$clear(0x7, r1) 00:23:19 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00'}) 00:23:19 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff9]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:19 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400, 0x0) syz_open_dev$vcsn(&(0x7f0000001080)='/dev/vcs#\x00', 0x186, 0x20101) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r3, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r3, 0x1, 0xd, 0x0, 0x0) getsockopt$nfc_llcp(r1, 0x118, 0x2, &(0x7f0000000080)=""/4096, 0x1000) [ 404.955142] input: syz1 as /devices/virtual/input/input73 00:23:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) getsockopt$sock_linger(r4, 0x1, 0xd, 0x0, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) [ 405.118228] input: syz1 as /devices/virtual/input/input74 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:20 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) close(r0) [ 405.342189] Unknown ioctl -1070574846 00:23:20 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:20 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r1, 0xc080661a, &(0x7f00000002c0)={{0x1, 0x0, @reserved="da4530fa97a26ee5c3f05df5a0c4f812377a5fdd421383f0c6ac8b1e63c54a17"}}) sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) ioctl$FBIOBLANK(r7, 0x4611, 0x1) r8 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r8, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r9 = accept4(r7, 0x0, 0x0, 0x800) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r10 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r10, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r11 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/checkreqprot\x00', 0x103c00, 0x0) sendfile(r9, r11, 0x0, 0x40000000000440) sendmsg$TIPC_CMD_SHOW_STATS(r9, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r9, 0x29, 0xca, &(0x7f0000000140)={0x800, 0x0, 0x10, 0x7, 0x1}, 0xc) r12 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCAX25ADDFWD(r12, 0x89ea, &(0x7f0000000200)={@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) r13 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r13, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) getsockopt$sock_linger(r13, 0x1, 0xd, 0x0, 0x0) r14 = creat(&(0x7f0000000080)='./file0\x00', 0x8) connect$rds(r14, &(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10) 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x2) 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x2) 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x2) [ 405.675709] input: syz1 as /devices/virtual/input/input78 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x2) [ 405.744829] input: syz1 as /devices/virtual/input/input79 00:23:20 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) accept$ax25(r2, 0x0, &(0x7f0000000040)) r4 = socket$can_bcm(0x1d, 0x2, 0x2) r5 = accept4(r4, 0x0, 0x0, 0x40000) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) ioctl$NBD_SET_SOCK(0xffffffffffffffff, 0xab00, r6) getsockopt$sock_linger(r5, 0x1, 0xd, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) ioctl$TIOCSISO7816(r9, 0xc0285443, &(0x7f0000000000)={0xff, 0x6, 0x74, 0x7, 0xff}) getsockopt$CAN_RAW_LOOPBACK(r5, 0x65, 0x3, 0x0, &(0x7f0000000080)) [ 405.834216] input: syz1 as /devices/virtual/input/input80 00:23:20 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) ioctl$USBDEVFS_BULK(r5, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x62, 0x10001, &(0x7f0000000340)="716d69a0426be6a67043331309beb8b4934df17b8b893c4918272ec2b8efd6278661bc32b005f52ba503ba0b930f4ffbdcd0b5ab9fe216e1739a94e915fe782318ef4a8e527c5ec532d900180ee59b8ce927a674910399670a9772a44e72fa5d20b9"}) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:20 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0x0) [ 405.954726] input: syz1 as /devices/virtual/input/input81 00:23:21 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:21 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) close(r0) [ 406.094439] Unknown ioctl -1070574846 [ 406.168484] Unknown ioctl -1070574846 00:23:21 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 406.413491] Unknown ioctl -1070574846 00:23:21 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$KDSKBMODE(r6, 0x4b45, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_ADDFB2(r3, 0xc06864b8, &(0x7f0000000080)={0x80000001, 0x6, 0xe60, 0x7, 0x1, [0x8, 0x1, 0x80000001, 0x1ff00], [0x81, 0x80000000, 0x8001, 0x87], [0xdc8, 0x0, 0x2, 0x81], [0x8000, 0x800, 0x0, 0x1]}) 00:23:21 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r1, 0x110, 0x2, &(0x7f0000000000)='pagemap\x00', 0x8) socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept$phonet_pipe(r2, &(0x7f0000000040), &(0x7f0000000080)=0x10) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r7, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r8 = accept4(r7, 0x0, 0x0, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r8, r9, 0x0, 0x50000000000443) r10 = socket$alg(0x26, 0x5, 0x0) bind$alg(r10, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r11 = accept4(r10, 0x0, 0x0, 0x0) sendfile(r11, 0xffffffffffffffff, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r11, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r11, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r11, 0x65, 0x3, 0x0, &(0x7f00000000c0)=0x28) 00:23:21 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x98}, 0x4000000) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:21 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:21 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) close(r0) [ 407.009714] Unknown ioctl -1070574846 [ 407.035845] Unknown ioctl -1070574846 00:23:22 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 407.240497] Unknown ioctl -1070574846 00:23:22 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x440080, 0x120) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r1, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x23}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @dev={0xac, 0x14, 0x14, 0x26}}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x24040800) r2 = socket$can_raw(0x1d, 0x3, 0x1) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x14, r5, 0x21}, 0x14}}, 0x0) sendmsg$NL80211_CMD_GET_REG(r3, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x2c, r5, 0x300, 0x70bd2a, 0x25dfdbfe, {}, [@NL80211_ATTR_USER_REG_HINT_TYPE={0x8}, @NL80211_ATTR_WIPHY={0x8, 0x1, 0x2}, @NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'bb\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x41}, 0x40) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000040)) syz_mount_image$bfs(&(0x7f00000001c0)='bfs\x00', &(0x7f0000000200)='./file0\x00', 0x100, 0x6, &(0x7f0000000680)=[{&(0x7f0000000240)="c894fd3e5a4f5d7bb9a608876c3af1cfde67d39d9076f618fb4e228c546bad953bc63c3d6ad3cc0141fc62b838aab4e336b27d3af59a9bdc58975f8831c11f45f21168b200408f877806de471b5dfb36f84057", 0x53, 0x44aa}, {&(0x7f00000002c0)="f07d6962c54dd9514f4c899d22f49ffbd3fdf7f1ab413c891c8ecabd1760f926fae7edc7891d89ba4c237600a76220a7adadaf9885aacecb6a353e358fddba5a683b1eb2cdb54b00c01a9909af845f44543f504cf0adfa0b947d0f33a056df6aaf1367d781191599a9f4c6790d3859327115f6f2a8506a39fcfb341501d313547d7711019d3df6b89f6e", 0x8a, 0x3f}, {&(0x7f0000000380)="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", 0xfe, 0x475e}, {&(0x7f0000000480)="93748a65d39430d2f88878796faab08445eb145d4bb677af798e645f6fe49c7af961d23474ca78fa8232c8bfe80bb3cf66d93dc25506a851762338a49e517e720f683460785180f2d3ea5b18e068b0f228220b7114cc75e979397cf5ff583e7af756fcadeb7c87e5385f9b5a10b5e5457abfac033f5d9a3f35bb0cc2ed62bdbe764ad5b9147066dff5d7b7c7b231b3513372a8c66c3163f95c46738b7a9939afd4fc0921f1919e3b", 0xa8, 0x4}, {&(0x7f0000000540)="fca9cc1715905add774a12361083916cbebf302fc93fdad158a60336f7705c99cd6a602e61e4b8", 0x27, 0x81}, {&(0x7f0000000580)="f393d0fb125df3fc0d2bba9b04110343104ca1fa795d7b3e57e77bfb00378cb7ffd2a8fe8c24d033dc483351a6cee69d672df3b8dfa424e0207ff3930cf67edd50db2555c370b38ef9c88e270e54365eaab3529443496bbc204bed6bc5ba1c21b5a3792ebb3a6607458e6ddbd7138463deb54c1f44397787212ef4727f712042960f79bf2b38aa2e7aaf25b72c615352ec9f53dacc9a4b8818dc5dff93d1a31844735508563226dc2a2d990b03adb7fc481145c1fb64923f2f49042a06c0149ee606077fc83d9259a2cc4025b6", 0xcd, 0x3}], 0x10101, 0x0) [ 407.353993] BFS-fs: bfs_fill_super(): No BFS filesystem on loop0 (magic=f3000000) 00:23:22 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r7, r8, 0x0, 0x50000000000443) 00:23:22 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) bind$tipc(r4, &(0x7f0000000080)=@id={0x1e, 0x3, 0x0, {0x4e20}}, 0x10) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r1, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$HCIINQUIRY(r6, 0x800448f0, &(0x7f0000000000)={0x2, 0x9, "95e6b5", 0x0, 0x5}) 00:23:22 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:22 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:23 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:23 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r4 = dup2(r2, r3) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r4, 0x800443d2, &(0x7f0000000040)={@any=[0x3]}) r5 = socket(0x200000000000011, 0x4000000000080002, 0x0) r6 = socket(0x11, 0x800000003, 0x0) bind(r6, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000300)=0x14) bind$packet(r5, &(0x7f0000000000)={0x11, 0x0, r7}, 0x14) sendmmsg(r5, &(0x7f0000000d00), 0x400004e, 0x0) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80001, 0x0) r9 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140)='NLBL_MGMT\x00') sendmsg$NLBL_MGMT_C_ADDDEF(r8, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40045000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x50, r9, 0x10, 0x70bd2d, 0x25dfdbfe, {}, [@NLBL_MGMT_A_DOMAIN={0x23, 0x1, 'selfbdevwlan1selfvmnet0\'md5sum\x00'}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x3}, @NLBL_MGMT_A_CLPDOI={0x8}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x50}, 0x1, 0x0, 0x0, 0x8000}, 0x44008) sendmsg$NLBL_MGMT_C_ADDDEF(r5, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="00042dbd7000fbdbdf250400000006000b001a000000080007007f0000011e00010076626f786e6574306d696d655f747970650000001d62477b1853aa2b2f783a5d54f607fd8bde9d9cf78bb5766a88cb8732d12cbb917f81f3c2cb6e2c8aed308418fd782fbb951afee26a9402f986b839127a36f52e377075d8cc22e2e145fa6e7aaecbcafb221f0915821deaf5419bef1968f173858a2a3a4d"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) sendmsg$NLBL_MGMT_C_VERSION(r4, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x34, r9, 0x2, 0x70bd29, 0x25dfdbff, {}, [@NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CV4DOI={0x8, 0x4, 0xffffffffffffffff}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_CLPDOI={0x8, 0xc, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0xc}, 0x24000844) sendmsg$NLBL_MGMT_C_ADD(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r9, 0x8, 0x70bd25, 0x25dfdbfd, {}, [@NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @loopback}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @local}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @loopback}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_DOMAIN={0x8, 0x1, '}).\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 408.073094] Unknown ioctl -1070574846 [ 408.092462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22923 comm=syz-executor.0 [ 408.204996] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=22924 comm=syz-executor.0 00:23:23 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0x2, 0x4}, 0x6) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000100)={0x5, 0x6}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:23 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) connect$netrom(r1, &(0x7f00000002c0)={{0x3, @bcast, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @default, @null]}, 0x48) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x1, 0x8, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}}, 0x14}, 0x1, 0x0, 0x0, 0x20004000}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_START_SCHED_SCAN(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x14, r5, 0x21}, 0x14}}, 0x0) sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0xa4, r5, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [@NL80211_ATTR_KEY_TYPE={0x8}, @NL80211_ATTR_KEY={0x58, 0x50, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPES={0x24, 0x8, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_KEY_DEFAULT={0x4}, @NL80211_KEY_SEQ={0x13, 0x4, "cb7fc926c518be07ab9c24f7d7d32a"}, @NL80211_KEY_DATA_WEP104={0x11, 0x1, "d9296487b45b81d7ab02738f10"}, @NL80211_KEY_DEFAULT={0x4}]}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}]}, @NL80211_ATTR_KEY_DEFAULT_MGMT={0x4}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x2}, @NL80211_ATTR_KEY_DEFAULT={0x4}]}, 0xa4}}, 0x4) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)=0xffffffffffffffb4) 00:23:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r5, r6, 0x0, 0x50000000000443) [ 408.408886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pig=22933 comm=syz-executor.0 00:23:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 00:23:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r2, 0x0}]) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r5, r6, 0x0, 0x50000000000443) 00:23:23 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000000)=0x9, 0x4) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r1 = creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x3, 0x0, 0x0, r1, 0x0}]) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r4, r5, 0x0, 0x50000000000443) 00:23:23 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) close(r0) 00:23:23 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) io_setup(0x1940c2a4, &(0x7f0000000640)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r2, r3, 0x0, 0x50000000000443) 00:23:23 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) creat(&(0x7f0000000040)='./bus\x00', 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r2, r3, 0x0, 0x50000000000443) [ 408.775724] Unknown ioctl -1070574846 [ 408.775944] Unknown ioctl -1070574846 00:23:23 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ocfs2_control\x00', 0x701201, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r2, r3, 0x0, 0x50000000000443) [ 408.977045] Unknown ioctl -1070574846 00:23:24 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, &(0x7f00000000c0)) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r3, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$FBIOGETCMAP(r6, 0x4604, &(0x7f0000000300)={0xfffffff8, 0xa, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000080)=[0x0], &(0x7f0000000200)=[0x0, 0x0, 0x0], &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$UI_DEV_SETUP(r3, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r3, 0x5502) ioctl$UI_ABS_SETUP(r3, 0x401c5504, &(0x7f0000000000)={0x0, {0x1ff, 0x3, 0x6, 0x2, 0x8, 0x7}}) 00:23:24 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r2, r3, 0x0, 0x50000000000443) 00:23:24 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r2, r3, 0x0, 0x50000000000443) 00:23:24 executing program 2: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:24 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000080)={r3, r6, 0x34}, 0x10) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 00:23:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 409.314729] input: syz1 as /devices/virtual/input/input82 00:23:24 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) close(r0) 00:23:24 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:24 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 409.619134] Unknown ioctl -1070574846 00:23:24 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) [ 409.749261] Unknown ioctl -1070574846 [ 410.004213] input: syz1 as /devices/virtual/input/input84 00:23:25 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvme-fabrics\x00', 0x105001, 0x0) write$UHID_GET_REPORT_REPLY(0xffffffffffffffff, &(0x7f00000000c0)={0xa, {0x8, 0xb0, 0x6}}, 0xa) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bsg\x00', 0x242, 0x0) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000240)={0x4, 0xe0, &(0x7f0000000140)="2edb0c7df37d64edf8b0dd0af94a1dcaff72dc1558a6d174378905dd5d74fd11ec25b9388fb590364e761bc081cc1dc7c7402f6d574b53e084851f68f6c0ebc010e042cff77c5a89b85d291eda283617fa01891c5f406f1deecae0fb786172337391158706a07d5e6c79878bda9aa2fdd439bc328d8323a2166876db91e37662cc701fb3a5989037b25d679fa25b8312570ddd5a922b21907339c77d974840ab56852992fa29e6867f0999b3a1cea2b0d795c2b1758de7da38922f4eb9cf36db1cddbe9357268b5cd059c750faa06c959fe778a9641ce83f22b0c53772cf0cc7"}) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000080)=0x8) prctl$PR_SET_NAME(0xf, &(0x7f0000000280)='/dev/nvme-fabrics\x00') getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) 00:23:25 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)=0x25) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:25 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) close(r0) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfb, 0x4000000}, 0xc) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:25 executing program 0: r0 = openat(0xffffffffffffff9c, 0xfffffffffffffffe, 0x3, 0x61) setsockopt$inet_mreq(r0, 0x0, 0x23, &(0x7f0000000000)={@local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x8) ioctl$KVM_SET_GSI_ROUTING(r0, 0x4008ae6a, &(0x7f0000001180)=ANY=[@ANYBLOB="05000000000000000900000002000000000000000000000000100000070000000000ffff00000000000000000000000000000000041900000200000000000000000000000010000000000000040000000000000000040000000000007c85000083000000490000000300000000000000000000000900000000800000e5550000ff000000000000000600000015f8fde78d3882600100007a12e71dde44fc5d0004000000000000000000000000100000c1ffffff00000000000000000000000000000000000000000000000029fd0000010000000000000000000000060000000000000005000000000000000200000000000000"]) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)) write$vhost_msg_v2(r0, &(0x7f0000001100)={0x2, 0x0, {&(0x7f0000000080)=""/4096, 0x1000, &(0x7f0000001080)=""/110, 0x3, 0x2}}, 0x48) r2 = accept$nfc_llcp(0xffffffffffffffff, &(0x7f0000001280), &(0x7f0000001300)=0x60) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000001340)={'ip6erspan0\x00', {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}) 00:23:25 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcsa\x00', 0x80000, 0x0) read$usbfs(r0, &(0x7f00000000c0)=""/18, 0x12) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/mls\x00', 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r2, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r5, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r5, 0x1, 0xd, 0x0, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r5, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$SIOCGSTAMPNS(r3, 0x8907, &(0x7f0000000000)) getsockopt$CAN_RAW_LOOPBACK(0xffffffffffffffff, 0x65, 0x3, 0x0, &(0x7f0000000140)) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(0xffffffffffffffff, 0x800443d3, &(0x7f00000000c0)={@fixed={[], 0x11}, 0x4c1a, 0x14, 0x8000}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000380)=0x8000, 0x4) r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f00000001c0)='net/kcm\x00') sendfile(r1, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r7, r8, 0x0, 0x50000000000443) accept$packet(r8, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000540)=0x14) sendmsg$nl_route(r5, &(0x7f0000000600)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="340000001500040028bd7000ffdbdf250a4920fe", @ANYRES32=r9, @ANYBLOB="0800080010000000140001fe8800000000c800000000000024000100"], 0x34}, 0x1, 0x0, 0x0, 0x402c8c5}, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r4, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) sendfile(r10, r11, 0x0, 0x50000000000443) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r11, 0x40045731, &(0x7f0000000040)=0x8) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r3, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @raw_data=[0x9, 0x1, 0x7, 0x6, 0x1ce5, 0x3e9, 0x5, 0xfffffff8, 0x7fffffff, 0x8, 0x1, 0x6, 0x4, 0x80000001, 0xae2, 0x7, 0x2, 0x0, 0xc305, 0x3, 0x101, 0x10000, 0x8, 0x8, 0x7f, 0x40, 0x7ff, 0x0, 0x1f, 0x63, 0x7f]}) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000000)) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:25 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) [ 410.687330] Unknown ioctl -1070574846 00:23:26 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:26 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) sendfile(r1, r2, 0x0, 0x50000000000443) 00:23:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 00:23:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 00:23:26 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x50000000000443) 00:23:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) 00:23:26 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xff0f}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_LINK={0x8, 0x3, r6}]}}}]}, 0x38}}, 0x0) sendmsg$can_raw(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x1d, r6}, 0x10, &(0x7f0000000100)={&(0x7f0000000080)=@canfd={{}, 0x2e, 0x2, 0x0, 0x0, "f075748f0f6d32240a45fa0e9456547ad155a3baa8d33fe7220a39d0c50fdc4e1adf2f1141a3dd16b41fa27e00f341caa4aa1025472d52c67edff2523db7c38a"}, 0x48}, 0x1, 0x0, 0x0, 0x4000804}, 0x10) 00:23:26 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000080)) 00:23:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) [ 411.482379] Unknown ioctl -1070574846 00:23:26 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x50000000000443) [ 411.534627] device sit338 entered promiscuous mode 00:23:27 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x0) 00:23:27 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x0) 00:23:27 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4106-gcm-aesni\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000400)='net/ip_tables_names\x00') sendfile(r1, r2, 0x0, 0x0) 00:23:27 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="080db5055e0bcfe8478071") r1 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x18, &(0x7f0000000040)={@remote}, &(0x7f00000000c0)=0x20) 00:23:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$unix(0x1, 0x5, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@abs={0x1}, 0x41) 00:23:27 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = accept4$nfc_llcp(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000000)=0x60, 0x0) accept4$nfc_llcp(r1, &(0x7f0000000100), &(0x7f0000000180)=0x60, 0x80000) 00:23:27 executing program 2: r0 = socket$packet(0x11, 0x4000000000000a, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x80000006}]}, 0x10) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x4e36, 0x0, @mcast2}, 0x1c) 00:23:27 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) ioctl$SIOCX25SDTEFACILITIES(r2, 0x89eb, &(0x7f0000000000)={0x101, 0x7, 0x401, 0x1, 0x20, 0x16, 0x1b, "c1c529676dfa23fcc538c4866d94ed49ec78d55b", "b102edfa14a7dcd5a759a0352a222ddd4c6bb405"}) 00:23:27 executing program 0: mount$9p_xen(&(0x7f0000000000)='syz\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800, &(0x7f0000000100)={'trans=xen,', {[{@cache_mmap='cache=mmap'}], [{@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, '/eth1}lo@'}}, {@fsname={'fsname', 0x3d, 'security)\b'}}, {@subj_type={'subj_type', 0x3d, 'GPL:wlan0vboxnet1.'}}, {@smackfshat={'smackfshat', 0x3d, 'em0'}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x61, 0x33, 0x65, 0x38, 0x63, 0x35, 0x37], 0x2d, [0x38, 0x64, 0x62, 0x62], 0x2d, [0x64, 0x65, 0x62, 0x63], 0x2d, [0x32, 0x64, 0x66, 0x34], 0x2d, [0x35, 0x35, 0x38, 0x62, 0x61, 0x37, 0x64, 0x64]}}}]}}) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)=0xfffffd72) 00:23:27 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:27 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000080)=0x337) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000100)=@req={0x28, &(0x7f00000000c0)={'nr0\x00', @ifru_map={0x1, 0x3, 0x7, 0x7, 0x81, 0x3f}}}) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x143000, 0x0) 00:23:27 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)='+', 0x1}], 0x1}, 0xc100) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") writev(r0, &(0x7f0000000400)=[{&(0x7f0000000480)="a9c92d9bea4824cc3854a62ffb84c4fb114d80fe462fd727b6f682cf0f9ccfe45f46ed18fc8af0505df86b4230370bfacd1f7266fae5859a3608357c69f51cfa473ef19a9dc2aeb43f9ed68acc034cf841229fbbe3f57130fe2ad707c56a92dbe64e59aa78e24db8e9b50597ab0024ca2564fbdb50e7b8cfa5c7028d556977ad6a90adf768a5ac0505ab07f8256368c6e71dd4b5a1c2e3c9946b610ab2b324099beb706b6a510c134ad18c928be3af6cf20e5016c9a050e35e30716e4913c882272bbfc8f0e1ee9c31484af6953e7d967640eff8accacee6daf3f98051a3ee281555a41340273dcb0bd8cc8cd549676f3ec23cbca42d4b76a178376eefb3da036d60cb88b5cb9c0ae0135be1d4f598c564fbe97ad4b691f59ba4063b898482d9cde4497009884d75b1965874e9c4d5a7cf8a640433c02acd340a98eff73e5948611184c7c60da3b233367d58aaf4e407e2e2c506b871fd822ec231389734d23a2aa5dc197831d8fee19361e5b99d0b51e5b1f0cadf296b91aa9477fa72879b4a3a3040777cf778cee1de32619701d71cb5316c7234a910b497b5f1b2cd2a0d39e92b6b92e091b470da2cec0e1b1fd3ce1a15d559b3733b97b2ddb1dd2aa73c9e03f189b8dd48c9093daddcd2c3fd0e1a9d16046d85c8934d2f9094aa5fa7b8ff061cb753dea2637ac2a8d523c9791ae454ea2e8cb10ce4a3ad8937ed583cd653bdb05b965e658f9c5f06a43bb1e61cfa4cb9be2cb4ef264d10f37e5292576bfdc97b2e1f8b692f0b64f76287e67805df914273677a9c39bd1e4f73d3c1afd99ad18a210caee42ab5c87969f6f99d7423dbb72d436ef3a3dead8eda03274d2e8e7f107eb04fdc3e36d6d4022dbc5c2fe388aaa3234950588ef56362708189826b98d3c9ed4dabcb33582a7e55327e82686aac973a5d0292afd7175a9c57b4fc1e5ba7cb0a34e35e50526d40bdb51a224e5b89e74e8752c1b39ab250b178adfab91c73c04d3c012b244cb7745dde4f716203ffcddaa096186ed0403b323c3aaa79aa4a0e6d1231ce99f83788ba0dc86da01cdad25816c26bf8e523b287d7ee83b5d0c55599ddbd202f743a1bc3d107a9c9610dc62537af48eecdd174ee4e796943250b81af0da28c57955aea149010ede13eb973dbe959500afe5e77b32ad5a11a353555b48eb7684596eadc481c291f185d0d47c639fa5bcb2dffe859a9d4a0e184a640e30f0afe83f2096faef9c0129289688a5267e0d2dadadd0f8cb13f35827f0337d2edf6220a244dd8c135563051f6fcd7fdad7879ff3ef01975938bc6e47aee745d4701cfc5e5546f05903bbcde0120ad847c32658c1384a6d8f188544df337a25f806051a346fb980a4e84fee06b0d367bc81161e96072b2e7e47999ac93437749d11864fa4c03a2d333135660aa17bd421623e6654eeae956e51a0157cb876db3e9cb324641d132cda7aabd9dcaa51f090c1955d20c2618466a0ea5acbaeac5a46e00b8869ca9a337eb5d9406592a790678a1f0bbe729054abb4810f4fdf50c517d4dd312b2d382412d45b9f60464c107c0735b16ceced73484f37cdcc8b9a4a62bc997bbd1d23b993fc5cfed9a43d2f4d335570e76715b020664bedb0db88816bc97ec37d13d64f604b71fc73f3c38954ae554e45997209afb0ff102dc170986e2d72e4178a7e6131308afa29ba732e251ebdf6254c0589752bfca3bef7fd0fc60ba683c6016b16234216bdcf8975bebafd8ee4606a96c1993d1f096b435fa84279344b914dec8e56566e103592a7ed44c63c8b5c18e01fa873032b1087622f225747339d38fa89e7008695ce0b3d6f505ab7ecdf99182ab7aa264d9108af35b0a373da18a8183f696dc70a8ac88c5663a866e89c7d7dbdf7296d63e5167978b38463ae9f36fe4121229e92cced04e", 0xffe4}], 0x1) 00:23:27 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:27 executing program 2: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) gettid() r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r1, 0x703, 0xe, 0x4d2f, &(0x7f0000000080)="1c04ff01de6da9725f90c5a06d0f9f2400844d0044a98db225a47ecb10b429441dec77009050d9560e58f2e162226d4fe467a890b6c4c556c6894acf3d4cd49c4dd5a2d05d6ce642e3abc0e0cb0a7de568fb3f30013c74eb73383ebaf4257042ec5277fa18a9b201882996c7b8de5080c75756094ac8e258ff1673c27fb2f2bffc290edbc5dec9e44b6fab8d5fcbd12ae8339b04701b316bd5eccc3961ce80", 0x0, 0xf0, 0x0, 0x0, 0xfffffffffffffe19}, 0x28) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) [ 412.922593] Unknown ioctl -1070574846 [ 412.949495] Unknown ioctl -1070574846 00:23:28 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90865, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xa79b, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="789ec13ef557fc7d83363d3ea3507e540783d029f646ab693da322b3f10b49e5b788577332883485a34485e56605d9dfc6", 0x31}, {&(0x7f0000000180)="5752219507358083a9848928a7066bfb5db860e902a882532f7f9c7f6528c27a10588e3718fb1afd8b7260a73375a01b1d0ae44e9f72d020fe3c6c25eaf31744ab140749f74624d73e88ddfe065457d61f6a9f1d4f6fa08b7ee8713358a7c3be1455ceb2c438c2e2092ede76f5388a4c76e0d01851cd3580e2ea2ae0db7fdaa09ae42a117c04eed9daacf5bb08c9ada160e5b899909cdabd3c395e2498d1a9a019d070f59d4f88f58e406a326e81c1", 0xaf}, {&(0x7f0000000240)="e1a2a353bd75d5786e0cec859ef958ba697be7e9f3bdecd00977d118e2e2f5f017e9826c1fa5ebf41f26eef7797a3002e5e4094c4322ce34ae4e7ae5b28ddc7660ca122a957a6371cd5c07c0f599fd72182ec3158d8a1c5e437d4ac52c977cebd60625bac328404d188a8a1d250a2098d0ea80b31c3b780f6e903d3b5c827d65859284569574283e362c82a274b9", 0x8e}, {&(0x7f0000000300)="e0b72c29d5c6117b1372b1a42c9d9cf09f58b420dc5e6b21f32e52f910fbaf86bc9c17e2d8f870935b18364cffa7315ce60492aca49c593bf32e3a4a02810fc932476cbe404f84a2d17cb13873b077e5a20b2ab674cb5c9f14ab8e816b07b8f61eaec8317724f550e3fd0f89354c3de5b54ae00e8794111b7872aea1f30c66e7787b96b04b73b029dc8b0c90", 0x8c}], 0x4}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x68c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) close(r2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 00:23:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90865, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xa79b, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="789ec13ef557fc7d83363d3ea3507e540783d029f646ab693da322b3f10b49e5b788577332883485a34485e56605d9dfc6", 0x31}, {&(0x7f0000000180)="5752219507358083a9848928a7066bfb5db860e902a882532f7f9c7f6528c27a10588e3718fb1afd8b7260a73375a01b1d0ae44e9f72d020fe3c6c25eaf31744ab140749f74624d73e88ddfe065457d61f6a9f1d4f6fa08b7ee8713358a7c3be1455ceb2c438c2e2092ede76f5388a4c76e0d01851cd3580e2ea2ae0db7fdaa09ae42a117c04eed9daacf5bb08c9ada160e5b899909cdabd3c395e2498d1a9a019d070f59d4f88f58e406a326e81c1", 0xaf}, {&(0x7f0000000240)="e1a2a353bd75d5786e0cec859ef958ba697be7e9f3bdecd00977d118e2e2f5f017e9826c1fa5ebf41f26eef7797a3002e5e4094c4322ce34ae4e7ae5b28ddc7660ca122a957a6371cd5c07c0f599fd72182ec3158d8a1c5e437d4ac52c977cebd60625bac328404d188a8a1d250a2098d0ea80b31c3b780f6e903d3b5c827d65859284569574283e362c82a274b9", 0x8e}, {&(0x7f0000000300)="e0b72c29d5c6117b1372b1a42c9d9cf09f58b420dc5e6b21f32e52f910fbaf86bc9c17e2d8f870935b18364cffa7315ce60492aca49c593bf32e3a4a02810fc932476cbe404f84a2d17cb13873b077e5a20b2ab674cb5c9f14ab8e816b07b8f61eaec8317724f550e3fd0f89354c3de5b54ae00e8794111b7872aea1f30c66e7787b96b04b73b029dc8b0c90", 0x8c}], 0x4}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x68c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) close(r2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 00:23:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90865, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xa79b, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="789ec13ef557fc7d83363d3ea3507e540783d029f646ab693da322b3f10b49e5b788577332883485a34485e56605d9dfc6", 0x31}, {&(0x7f0000000180)="5752219507358083a9848928a7066bfb5db860e902a882532f7f9c7f6528c27a10588e3718fb1afd8b7260a73375a01b1d0ae44e9f72d020fe3c6c25eaf31744ab140749f74624d73e88ddfe065457d61f6a9f1d4f6fa08b7ee8713358a7c3be1455ceb2c438c2e2092ede76f5388a4c76e0d01851cd3580e2ea2ae0db7fdaa09ae42a117c04eed9daacf5bb08c9ada160e5b899909cdabd3c395e2498d1a9a019d070f59d4f88f58e406a326e81c1", 0xaf}, {&(0x7f0000000240)="e1a2a353bd75d5786e0cec859ef958ba697be7e9f3bdecd00977d118e2e2f5f017e9826c1fa5ebf41f26eef7797a3002e5e4094c4322ce34ae4e7ae5b28ddc7660ca122a957a6371cd5c07c0f599fd72182ec3158d8a1c5e437d4ac52c977cebd60625bac328404d188a8a1d250a2098d0ea80b31c3b780f6e903d3b5c827d65859284569574283e362c82a274b9", 0x8e}, {&(0x7f0000000300)="e0b72c29d5c6117b1372b1a42c9d9cf09f58b420dc5e6b21f32e52f910fbaf86bc9c17e2d8f870935b18364cffa7315ce60492aca49c593bf32e3a4a02810fc932476cbe404f84a2d17cb13873b077e5a20b2ab674cb5c9f14ab8e816b07b8f61eaec8317724f550e3fd0f89354c3de5b54ae00e8794111b7872aea1f30c66e7787b96b04b73b029dc8b0c90", 0x8c}], 0x4}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x68c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) close(r2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 00:23:28 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90865, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xa79b, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="789ec13ef557fc7d83363d3ea3507e540783d029f646ab693da322b3f10b49e5b788577332883485a34485e56605d9dfc6", 0x31}, {&(0x7f0000000180)="5752219507358083a9848928a7066bfb5db860e902a882532f7f9c7f6528c27a10588e3718fb1afd8b7260a73375a01b1d0ae44e9f72d020fe3c6c25eaf31744ab140749f74624d73e88ddfe065457d61f6a9f1d4f6fa08b7ee8713358a7c3be1455ceb2c438c2e2092ede76f5388a4c76e0d01851cd3580e2ea2ae0db7fdaa09ae42a117c04eed9daacf5bb08c9ada160e5b899909cdabd3c395e2498d1a9a019d070f59d4f88f58e406a326e81c1", 0xaf}, {&(0x7f0000000240)="e1a2a353bd75d5786e0cec859ef958ba697be7e9f3bdecd00977d118e2e2f5f017e9826c1fa5ebf41f26eef7797a3002e5e4094c4322ce34ae4e7ae5b28ddc7660ca122a957a6371cd5c07c0f599fd72182ec3158d8a1c5e437d4ac52c977cebd60625bac328404d188a8a1d250a2098d0ea80b31c3b780f6e903d3b5c827d65859284569574283e362c82a274b9", 0x8e}, {&(0x7f0000000300)="e0b72c29d5c6117b1372b1a42c9d9cf09f58b420dc5e6b21f32e52f910fbaf86bc9c17e2d8f870935b18364cffa7315ce60492aca49c593bf32e3a4a02810fc932476cbe404f84a2d17cb13873b077e5a20b2ab674cb5c9f14ab8e816b07b8f61eaec8317724f550e3fd0f89354c3de5b54ae00e8794111b7872aea1f30c66e7787b96b04b73b029dc8b0c90", 0x8c}], 0x4}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000007c0)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)}, 0x20) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x68c) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0xa, 0x6, 0x0) close(r2) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0x29, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 00:23:28 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r2, 0x10, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x801}, 0x20000809) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r3, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$getflags(r3, 0x408) 00:23:28 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) [ 413.426225] [ 413.427886] ====================================================== [ 413.434186] WARNING: possible circular locking dependency detected [ 413.440489] 4.14.167-syzkaller #0 Not tainted [ 413.444962] ------------------------------------------------------ [ 413.451256] syz-executor.2/23249 is trying to acquire lock: [ 413.456944] ((&strp->work)){+.+.}, at: [] flush_work+0x84/0x730 [ 413.464746] [ 413.464746] but task is already holding lock: [ 413.470698] (sk_lock-AF_INET){+.+.}, at: [] kcm_ioctl+0x35d/0x1120 [ 413.478660] [ 413.478660] which lock already depends on the new lock. [ 413.478660] [ 413.486960] [ 413.486960] the existing dependency chain (in reverse order) is: [ 413.494560] [ 413.494560] -> #1 (sk_lock-AF_INET){+.+.}: [ 413.500268] lock_acquire+0x16f/0x430 [ 413.504569] lock_sock_nested+0xbd/0x110 [ 413.509145] strp_sock_lock+0x2e/0x40 [ 413.513459] strp_work+0x43/0x100 [ 413.517418] process_one_work+0x863/0x1600 [ 413.522164] worker_thread+0x5d9/0x1050 [ 413.526674] kthread+0x319/0x430 [ 413.530554] ret_from_fork+0x24/0x30 [ 413.534764] [ 413.534764] -> #0 ((&strp->work)){+.+.}: [ 413.540295] __lock_acquire+0x2cb3/0x4620 [ 413.545098] lock_acquire+0x16f/0x430 [ 413.549404] flush_work+0xae/0x730 [ 413.553454] __cancel_work_timer+0x2f0/0x480 [ 413.558361] cancel_work_sync+0x18/0x20 [ 413.562847] strp_done+0x58/0xe0 [ 413.566712] kcm_ioctl+0x8d9/0x1120 [ 413.570853] sock_do_ioctl+0x64/0xb0 [ 413.575079] sock_ioctl+0x2a6/0x470 [ 413.579219] do_vfs_ioctl+0x7ae/0x1060 [ 413.583613] SyS_ioctl+0x8f/0xc0 [ 413.587490] do_syscall_64+0x1e8/0x640 [ 413.591909] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 413.597611] [ 413.597611] other info that might help us debug this: [ 413.597611] [ 413.605830] Possible unsafe locking scenario: [ 413.605830] [ 413.611866] CPU0 CPU1 [ 413.616514] ---- ---- [ 413.621169] lock(sk_lock-AF_INET); [ 413.624866] lock((&strp->work)); [ 413.630910] lock(sk_lock-AF_INET); [ 413.637137] lock((&strp->work)); [ 413.640666] [ 413.640666] *** DEADLOCK *** [ 413.640666] [ 413.646736] 1 lock held by syz-executor.2/23249: [ 413.651469] #0: (sk_lock-AF_INET){+.+.}, at: [] kcm_ioctl+0x35d/0x1120 [ 413.659867] [ 413.659867] stack backtrace: [ 413.664351] CPU: 0 PID: 23249 Comm: syz-executor.2 Not tainted 4.14.167-syzkaller #0 [ 413.672215] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.681553] Call Trace: [ 413.684138] dump_stack+0x142/0x197 [ 413.687762] ? vprintk_func+0x65/0x159 [ 413.691643] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 413.696989] __lock_acquire+0x2cb3/0x4620 [ 413.701119] ? trace_hardirqs_on+0x10/0x10 [ 413.705341] ? save_trace+0x290/0x290 [ 413.709125] ? debug_object_assert_init+0x163/0x300 [ 413.714129] ? save_trace+0x290/0x290 [ 413.717930] ? __lock_is_held+0xb6/0x140 [ 413.721984] lock_acquire+0x16f/0x430 [ 413.725774] ? flush_work+0x84/0x730 [ 413.729477] ? flush_work+0x5c6/0x730 [ 413.733259] flush_work+0xae/0x730 [ 413.736780] ? flush_work+0x84/0x730 [ 413.740476] ? insert_work+0x320/0x320 [ 413.744345] ? find_held_lock+0x35/0x130 [ 413.748400] ? del_timer+0xbd/0xf0 [ 413.751933] ? mark_held_locks+0xb1/0x100 [ 413.756069] ? __cancel_work_timer+0x166/0x480 [ 413.760633] __cancel_work_timer+0x2f0/0x480 [ 413.765030] ? cancel_delayed_work+0x20/0x20 [ 413.769422] ? mark_held_locks+0xb1/0x100 [ 413.773558] ? __local_bh_enable_ip+0x99/0x1a0 [ 413.778129] cancel_work_sync+0x18/0x20 [ 413.782092] strp_done+0x58/0xe0 [ 413.785456] kcm_ioctl+0x8d9/0x1120 [ 413.789066] ? kcm_done_work+0x20/0x20 [ 413.792941] ? __might_fault+0x110/0x1d0 [ 413.796998] sock_do_ioctl+0x64/0xb0 [ 413.800702] sock_ioctl+0x2a6/0x470 [ 413.804319] ? dlci_ioctl_set+0x40/0x40 [ 413.808286] do_vfs_ioctl+0x7ae/0x1060 [ 413.812174] ? selinux_file_mprotect+0x5d0/0x5d0 [ 413.816911] ? lock_downgrade+0x740/0x740 [ 413.821064] ? ioctl_preallocate+0x1c0/0x1c0 [ 413.825461] ? __fget+0x237/0x370 [ 413.828901] ? security_file_ioctl+0x89/0xb0 [ 413.833298] SyS_ioctl+0x8f/0xc0 [ 413.836644] ? do_vfs_ioctl+0x1060/0x1060 [ 413.840800] do_syscall_64+0x1e8/0x640 [ 413.844679] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.849502] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 413.854677] RIP: 0033:0x45b349 [ 413.857853] RSP: 002b:00007f5552a78c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 413.865543] RAX: ffffffffffffffda RBX: 00007f5552a796d4 RCX: 000000000045b349 00:23:28 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:28 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:28 executing program 3: fallocate(0xffffffffffffffff, 0x3c, 0x6, 0x2) r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) dup(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) r6 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r5, r6, 0x0, 0x50000000000443) ioctl$PPPIOCNEWUNIT(0xffffffffffffffff, 0xc004743e, &(0x7f0000000040)=0x4) r7 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r7, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) fcntl$setpipe(r7, 0x407, 0x0) 00:23:28 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:28 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 413.872800] RDX: 0000000020000100 RSI: 00000000000089e0 RDI: 0000000000000005 [ 413.880057] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 413.887312] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000ffffffff [ 413.894567] R13: 00000000000006d2 R14: 00000000004c8499 R15: 000000000075bfd4 [ 413.904434] PM: Basic memory bitmaps freed 00:23:29 executing program 0: getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000080), 0x4) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000100)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r0 = socket$can_raw(0x1d, 0x3, 0x1) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x1, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x40, 0x0) [ 414.015876] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 414.022406] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 414.028865] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:29 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) ioctl$sock_rose_SIOCADDRT(r2, 0x890b, &(0x7f0000000040)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x6, @default, @rose={'rose', 0x0}, 0x2, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) [ 414.076674] PM: Basic memory bitmaps created [ 414.085748] Unknown ioctl -1070574846 [ 414.099306] Unknown ioctl -1070574846 [ 414.102072] Unknown ioctl -1070574846 [ 414.125074] PM: Basic memory bitmaps freed 00:23:29 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) 00:23:29 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:29 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:29 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:29 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$VIDIOC_ENUMAUDOUT(r3, 0xc0345642, &(0x7f0000000000)={0x40, "7603dfe67520a06ad4b4fec65ba73f8c028340886d8da5d9dd5464b45e58ccb5", 0x1, 0x1}) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 414.841099] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 414.847464] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 414.855607] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:30 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x10800, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000000c0)={'veth1_to_bridge\x00', 0x8000}) ptrace$getsig(0x4202, 0x0, 0xab4, &(0x7f0000000000)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000100)) socket$can_raw(0x1d, 0x3, 0x1) 00:23:30 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) [ 414.922499] PM: Basic memory bitmaps created [ 414.941289] Unknown ioctl -1070574846 [ 414.941899] Unknown ioctl -1070574846 [ 414.949065] Unknown ioctl -1070574846 [ 414.957918] PM: Basic memory bitmaps freed 00:23:30 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:30 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:30 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:30 executing program 3: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)) r1 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r1, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 415.659051] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 415.665755] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 415.672557] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:30 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) openat(r3, &(0x7f0000000000)='./file0\x00', 0x440001, 0x58) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f0000000100)) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) 00:23:30 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) read$usbmon(r3, &(0x7f0000001080)=""/4110, 0x100e) 00:23:30 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) [ 415.764439] PM: Basic memory bitmaps created [ 415.769646] Unknown ioctl -1070574846 [ 415.772076] Unknown ioctl -1070574846 [ 415.774908] Unknown ioctl -1070574846 [ 415.795468] PM: Basic memory bitmaps freed 00:23:31 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:31 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:31 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 416.423517] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 416.429917] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 416.439319] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:31 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:31 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) sendmsg(r1, &(0x7f0000000580)={&(0x7f0000000040)=@in6={0xa, 0x4e20, 0x9, @rand_addr="50d303458da9f184650ec25697812f9f", 0x10001}, 0x80, &(0x7f00000003c0)=[{&(0x7f00000000c0)="1092f769fb9e23f0491b3666347a3095afe14ee9c6e3b5aedcb3efc8832b647fe620c2325bce7a0ceb7a19a640f51d9bcf72680151d155a269eae3db6b7f0a887703b13bc70de246407d2c1b2fbe115583adef53907dccdcb77d5f56f91370cb4458d1ed0bab5efbd5b88fc40c4d976eacf011770607ea7fc22aef2a90e027212afbba81366a20c5cbaad9bc5458de58cb51d965bb", 0x95}, {&(0x7f0000000180)="6f0b8a15a8e17762a3e945aa975f8b51fc44f36fc16a60dd156b3c5c64bdba5b450859d2bcfb46f33544a91897317c4a54fd2adfab5cf7f73e05fed2d31ee4664ad3f5b4d50e007112a1b24cb50d6706a7f97eeeb9f51454b59bf8129db3ad5b7f835e6d3ebcfcb7ba77337a201b9352cb677f49952dff0be79cfc53c6334b25cd788bdd4445f214d5c18de090c14aef10d47555ee17b3d2a112f0731a860b", 0x9f}, {&(0x7f0000000240)="80e3153f52d278f768d762cda439d6d8b86e69554b60f653eba595e5f1d4c07f3b85160f4cf397e9fe6eb2f366e51e519c42be03b6512a8cbd8cf4cff7ad72a3d115317a3fcb001bc581cba23703c76b264ece3eccd58725811e20ace045687eaf1d148e82d098c51ec02a12254314bcfaad501cf5650e24b33a3700", 0x7c}, {&(0x7f00000002c0)="64b151383cfcd6110d0b5377faf9dd16", 0x10}, {&(0x7f0000000300)="d8ea8f1c9c8888c84b76cf914c910f05f2b4ded379f16571411145cfe49e6532ab087f6119f4626d4aefd1a9c2f2d611337a22465f7185a1e860d74bb755136fa2cdf5b42d3655fd3c63be31ada33f7be3d4eb56950f329001c30424fd247ffb9be90d985608e2f467dddabe02a24b18732d3b92789bbfd0c3ee8a51344b6d05482301a869f92707b3fd02fe6a330a8b214beb5bf2eebce644b8d63af0f6e56fff47a4fbd4e5d3c45167a142980d1a1f6d23829c72edbf195b6fdce2278b49", 0xbf}], 0x5, &(0x7f0000000440)=[{0xb8, 0x116, 0x2, "edab4791cdd9c744d83960492c03f320c29599dfdb26e3057d8719af3df7efdcc07413f4c0c0e739bddf11bee595fc8d55a029be9fd0aaa8c72284115a6279bc0805dcbba0000cb9185609be326b3c9a3c264d645dd00da9245256211d15b0b5db6eb30d13236b224b5f9ef9cdd541cdedb562987b935737b19bcdea5ea2bc1c541128d06ae8c02bf9d64fed2eb9ae132ed883ead8dbcb295c94e205afe52a4ef7"}, {0x18, 0x1, 0x4c, "cee3"}, {0x40, 0x118, 0x8, "70ae5d83714909d593b9acc145dbbc1f9d7448234750ce65ea7da0b82056d3f7ef4283198fdea3b37cd42ab5f1"}], 0x110}, 0x20000810) [ 416.525839] PM: Basic memory bitmaps created [ 416.532582] Unknown ioctl -1070574846 [ 416.535203] Unknown ioctl -1070574846 00:23:31 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r1, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000600)={0x18, r3, 0x401, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0x4}]}, 0x18}}, 0x0) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000002}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x74, r3, 0x300, 0x70bd2c, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x60, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x941}, @TIPC_NLA_SOCK_CON={0x4c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x1ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x2b}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7f}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xffffffff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffffc}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x10}, 0x4008000) r4 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/nvme-fabrics\x00', 0x0, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000300)={@mcast1, 0x3, 0x1, 0x2, 0x2, 0x1, 0x3}, &(0x7f0000000340)=0x20) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r5 = dup(r2) r6 = syz_genetlink_get_family_id$batadv(&(0x7f00000001c0)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(r5, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r6, 0x4, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x810) 00:23:31 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) 00:23:31 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = getpid() sched_setattr(r2, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x9}, 0x0) r3 = getpgid(r2) r4 = syz_open_procfs(r3, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r4, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, 0x0, 0x0) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r6, r7, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x2844) getsockopt$sock_linger(r6, 0x1, 0xd, 0x0, 0x0) r8 = socket$alg(0x26, 0x5, 0x0) bind$alg(r8, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r9 = accept4(r8, 0x0, 0x0, 0x0) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r9, r10, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r9, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r9, 0x1, 0xd, 0x0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r12 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r12, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r13 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r13, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r14 = accept4(r13, 0x0, 0x0, 0x80800) ioctl$TIOCGSID(r7, 0x5429, &(0x7f0000000200)=0x0) r16 = syz_open_procfs(r15, &(0x7f0000000180)='net/stat\x00') sendfile(r14, r16, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r14, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r14, 0x1, 0xd, 0x0, 0x0) getsockopt$CAN_RAW_LOOPBACK(r14, 0x65, 0x3, 0x0, &(0x7f0000000080)=0xffffffffffffff58) [ 416.616521] PM: Basic memory bitmaps freed [ 416.636039] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 416.647616] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 416.658267] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:31 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:31 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket(0x10, 0x3, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) ioctl$KVM_DEASSIGN_PCI_DEVICE(r4, 0x4040ae72, &(0x7f0000000080)={0x1, 0x81, 0xfffffffb, 0x6, 0x9}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) syz_mount_image$hfsplus(&(0x7f0000000240)='hfsplus\x00', &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=r5, @ANYBLOB="afa7068b"]) setgid(r5) [ 416.733532] PM: Basic memory bitmaps created [ 416.741306] PM: Basic memory bitmaps freed [ 416.747314] audit: type=1400 audit(1580084611.775:71): avc: denied { getopt } for pid=23372 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 416.822801] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 416.829132] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 416.835887] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 416.860683] hfsplus: unable to parse mount options 00:23:31 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 416.885361] PM: Basic memory bitmaps created [ 416.892065] Unknown ioctl -1070574846 [ 416.899261] PM: Basic memory bitmaps freed [ 416.939440] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 416.946287] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 416.953919] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:32 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 416.992113] PM: Basic memory bitmaps created [ 416.998319] Unknown ioctl -1070574846 [ 417.005904] PM: Basic memory bitmaps freed [ 417.037457] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 417.045070] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 417.051812] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 417.090857] PM: Basic memory bitmaps created [ 417.097124] Unknown ioctl -1070574846 [ 417.105125] PM: Basic memory bitmaps freed 00:23:32 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:32 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:32 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 417.246349] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 417.253198] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 417.259480] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 417.336320] PM: Basic memory bitmaps created [ 417.344506] Unknown ioctl -1070574846 00:23:32 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 417.382387] PM: Basic memory bitmaps freed 00:23:32 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) [ 417.411168] Unknown ioctl -1070574846 [ 417.425750] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 417.432386] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 417.438682] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:32 executing program 0: socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x400000, 0x0) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) [ 417.523167] PM: Basic memory bitmaps created 00:23:32 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000140)={0x0, 0xffffffffffffffdf, &(0x7f0000000100)={0x0}}, 0x0) getsockopt$sock_linger(r2, 0x1, 0xd, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r4, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) r5 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r5, 0x10e, 0x4, 0x0, &(0x7f0000000000)=0x10) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000140)={r4, r5, 0x291, 0xa9, &(0x7f0000000080)="f72e8332d8105a95c2847852664323078371d05f2798b6eb59614a437574793737f0967d989e96096fcdda25e973fd6d814fa01ae5eaa01014d59f2e6c42da84e85cb2b7539cd862182aaa66804d1002cd7becf84970a0f11b90d5ffe5b638194517f2fef3ee5a0dfd47f980eb0870765c5379df54d95c9b9c564a7cee4006951fad147c7af67f4a70c09b21665eb02938394e5cd18c69c4644f992491a550541d71f4f03f97d7429c", 0x2, 0x80, 0x1, 0x4, 0xdc, 0x1, 0x4, 'syz1\x00'}) 00:23:32 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 417.548132] PM: Basic memory bitmaps freed 00:23:32 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nvram\x00', 0x36080, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r1, 0x8008ae9d, &(0x7f0000000080)=""/148) [ 417.592502] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 417.598774] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 417.605709] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 417.614897] hfsplus: unable to parse mount options 00:23:32 executing program 3: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000000)) 00:23:32 executing program 3: socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r1, r2, 0x0, 0x50000000000443) getsockopt$CAN_RAW_LOOPBACK(r2, 0x65, 0x3, 0x0, &(0x7f0000000040)=0xffffffffffffff46) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r4, r5, 0x0, 0x50000000000443) ioctl$TIOCSERGETLSR(r5, 0x5459, &(0x7f0000000000)) 00:23:32 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(0xffffffffffffffff, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 417.725343] PM: Basic memory bitmaps created [ 417.733795] PM: Basic memory bitmaps freed [ 417.767585] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 417.774103] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 417.781790] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 417.819992] PM: Basic memory bitmaps created [ 417.826187] Unknown ioctl -1070574846 [ 417.834267] PM: Basic memory bitmaps freed 00:23:33 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:33 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:33 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 418.066696] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 418.073623] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 418.079911] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:33 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 418.158296] PM: Basic memory bitmaps created [ 418.165351] PM: Basic memory bitmaps freed [ 418.201324] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 418.207641] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 418.214158] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:33 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) 00:23:33 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 418.251171] PM: Basic memory bitmaps created [ 418.257190] Unknown ioctl -1070574846 [ 418.265265] PM: Basic memory bitmaps freed [ 418.309290] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 418.315925] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 418.323250] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 418.365836] PM: Basic memory bitmaps created [ 418.372047] Unknown ioctl -1070574846 [ 418.383740] PM: Basic memory bitmaps freed 00:23:33 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000040)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) accept$alg(r2, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r3, 0x800455d1, &(0x7f0000000000)) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x414ac0, 0x0) r4 = socket$inet(0x2, 0x4000000805, 0x0) r5 = socket$inet_sctp(0x2, 0x5, 0x84) r6 = dup3(r4, r5, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000240)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r6, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r5, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r6, 0x84, 0x7a, &(0x7f000059aff8)={r7}, &(0x7f000034f000)=0x2059b000) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f00000000c0)={r7, 0x8f, 0xdce6}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={r8, 0x11d6, 0xfffd, 0x5, 0x7fffffff, 0xa59}, 0x14) r9 = socket$alg(0x26, 0x5, 0x0) bind$alg(r9, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r10 = accept4(r9, 0x0, 0x0, 0x0) r11 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r10, r11, 0x0, 0x50000000000443) r12 = socket$alg(0x26, 0x5, 0x0) bind$alg(r12, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r13 = accept4(r12, 0x0, 0x0, 0x0) r14 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r13, r14, 0x0, 0x50000000000443) ioctl$DRM_IOCTL_GEM_FLINK(r14, 0xc008640a, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_GEM_CLOSE(r11, 0x40086409, &(0x7f0000000200)={r15}) 00:23:33 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 418.456187] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 418.462645] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 418.468917] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:33 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x3a, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 418.516842] PM: Basic memory bitmaps created [ 418.523232] Unknown ioctl -1070574846 [ 418.530901] PM: Basic memory bitmaps freed [ 418.575901] cannot load conntrack support for proto=10 00:23:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x3a, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 418.597136] cannot load conntrack support for proto=10 [ 418.608226] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 418.614898] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 418.627767] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] 00:23:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x3a, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 418.653006] cannot load conntrack support for proto=10 [ 418.698937] cannot load conntrack support for proto=10 [ 418.744047] PM: Basic memory bitmaps created [ 418.751700] PM: Basic memory bitmaps freed 00:23:33 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:33 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) sendmsg(r1, &(0x7f0000000a40)={0x0, 0x3a, &(0x7f0000000380)=[{&(0x7f00000003c0)="339a", 0x2d05}], 0x1}, 0x0) [ 418.876981] cannot load conntrack support for proto=10 00:23:33 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:33 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r2, r3, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r3, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r4, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r5, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) [ 418.908318] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 418.914930] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 418.921454] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 419.003387] PM: Basic memory bitmaps created [ 419.042991] Unknown ioctl -1070574846 [ 419.047342] PM: Basic memory bitmaps freed 00:23:34 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) 00:23:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x5}, 0x1c) [ 419.126126] cannot load conntrack support for proto=10 00:23:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f00000003c0), 0x1c) 00:23:34 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) socket$inet6(0xa, 0x3, 0x3c) 00:23:34 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) 00:23:34 executing program 0: r0 = socket$inet6(0xa, 0x3, 0xfb) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8922, &(0x7f0000000040)={'vlan1\x00', 0x800000000008a03}) [ 419.375736] cannot load conntrack support for proto=10 00:23:34 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="280000001900f5ff00000200000000000ce600000800030006000000ac00020a1e0f071b919c050092ea0000c689d6497ff646724a5702ba16c8"], 0x28}}, 0x0) r0 = socket(0x10, 0x2, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmmsg$alg(r0, &(0x7f0000000300)=[{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080), 0xfffffffffffffdc2}, {&(0x7f0000000100)="2621ac085c69b17809b42cb013ede48b21d82d06322c45bf1f59f126747308a62b5009fe066cbcdd4d7743889638725e807465e4c2596ae711bfade298e44ede896d51b68d9e5bb6b9823c88fe07e5355ba0c499"}], 0x0, &(0x7f00000001c0)}], 0x1be, 0x0) [ 419.415258] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 419.429119] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 419.443340] cannot load conntrack support for proto=10 [ 419.456897] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 419.508523] PM: Basic memory bitmaps created [ 419.514773] Unknown ioctl -1070574846 [ 419.522570] PM: Basic memory bitmaps freed 00:23:34 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:34 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0xd4, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000001600ff8e00000000000000000a0000001800000014000a000040000000000000000000000200000000"], 0x2c}}, 0x0) r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000000c0)={0x7ff}, 0x10) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924b68, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") sendmsg$NLBL_MGMT_C_REMOVEDEF(0xffffffffffffffff, 0x0, 0x0) 00:23:34 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:34 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 419.714985] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 419.721630] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 419.727896] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 419.816011] PM: Basic memory bitmaps created 00:23:34 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) 00:23:34 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="080db5055e0bcfe847a071") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x2000077d, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) 00:23:34 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) 00:23:35 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:35 executing program 3: setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) 00:23:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b4c, &(0x7f0000000180)) 00:23:35 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) 00:23:35 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 420.247949] Unknown ioctl -1070574846 00:23:35 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b4c, &(0x7f0000000180)) [ 420.490691] PM: Basic memory bitmaps freed 00:23:35 executing program 1: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(0xffffffffffffffff, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) ioctl$SIOCAX25NOUID(0xffffffffffffffff, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:35 executing program 3: socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208, 0x208, 0x208, 0x208, 0x208, 0x3, 0x0, {[{{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @loopback, [], [], 'gretap0\x00', 'bond0\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@common=@unspec=@state={{0x28, 'state\x00'}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00'}}, {{@uncond, 0x0, 0xa8, 0x110}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x338) [ 420.537219] PM: Marking nosave pages: [mem 0x00000000-0x00000fff] [ 420.544331] PM: Marking nosave pages: [mem 0x0009f000-0x000fffff] [ 420.551885] PM: Marking nosave pages: [mem 0xbfffd000-0xffffffff] [ 420.652694] PM: Basic memory bitmaps created 00:23:35 executing program 2: r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg(r0, &(0x7f0000000140)={&(0x7f00000003c0)=@in={0x2, 0x0, @loopback}, 0x80, 0x0}, 0x20000000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000021000000000000000000001e95000000000000004297b97244e60f60475ccf3f42cf8874bda743daa5d5a2de7bad662aa9e8e508d0d57a3901b34a530be2e6137b5302cce6aead52099c20be2406e2692660d33dd04a3f23c5ae87f0d156a6e5ec9d50eeec6bce000000c4bcef01687e44cfff29a5ca2081880204ec1153423932ff0759c02c4b68f1d151c155dbde10d0c1de66a968590fc93cbed0f8050f11"], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251}, 0x29) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000040)={r0, r1}) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f0000000100)={r0, r1}) 00:23:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b4c, &(0x7f0000000180)) 00:23:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 00:23:36 executing program 5: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() openat$vim2m(0xffffffffffffff9c, &(0x7f0000000540)='/dev/video35\x00', 0x2, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r5, 0xc0305302, &(0x7f0000000380)={0x8, 0x1, 0x8, 0x0, 0x81, 0x8}) dup(0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) r6 = openat$ubi_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SIOCAX25NOUID(r6, 0x89e3, &(0x7f0000000280)=0x1) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000180), &(0x7f0000000200)=0x4) close(r1) 00:23:36 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b4c, &(0x7f0000000180)) 00:23:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 00:23:36 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, 0x0, 0x0) 00:23:36 executing program 0: ioctl$KDSKBENT(0xffffffffffffffff, 0x4b4c, &(0x7f0000000180)) [ 421.076777] Unknown ioctl -1070574846 00:23:36 executing program 4: keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffd66, 0x0) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xaf, 0x9}, 0x0, 0x8101, 0x0, 0x8, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x0, 0x0) dup(0xffffffffffffffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x6) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ipv6_route\x00') r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x20601, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-cipher_null\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sendfile(r3, r4, 0x0, 0x50000000000443) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x3, 0x4, [], 0x5, &(0x7f0000000000)=[{}, {}, {}, {}, {}], &(0x7f0000000080)=""/4}, &(0x7f0000000140)=0x78) request_key(&(0x7f0000000240)='encrypted\x00', 0x0, 0x0, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000340)='keyring\x00', 0x0, 0x0, 0x0, 0x0) getpid() sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x48814) ioctl$