0, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{0x0}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:11 executing program 1: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) chroot(&(0x7f0000000240)='./file0\x00') ioctl$NBD_SET_SOCK(r0, 0xab00, 0xffffffffffffffff) keyctl$link(0x8, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='veth1\x00', 0x10) connect$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000100000000a87f65b44b027c5aa2ce8f"], 0x18}, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffff9c, 0xc00c642e, &(0x7f0000000040)={0x0, 0x80000, 0xffffffffffffff9c}) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000013, &(0x7f0000000180), 0x4) sendmmsg(r1, &(0x7f0000000140)=[{{&(0x7f00000001c0)=@l2, 0x80, &(0x7f0000000040), 0x0, &(0x7f0000000200)}}], 0x400001f, 0x0) 21:25:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:11 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, 0x0, 0x0) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:11 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00005ec000)="366521ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000003b00)=[{{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000a00)="58ffbe1b9fd922", 0x7}], 0x1, &(0x7f0000000a80)}}], 0x1, 0x0) 21:25:11 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{0x0}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:11 executing program 4: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) pipe(&(0x7f0000000400)={0xffffffffffffffff}) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:11 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000de2ff4), 0xc, &(0x7f00007a8000)={&(0x7f0000000280)={0x1c, 0x0, 0x1, 0xffffffffffffffff, 0x0, 0x0, {}, [@nested={0x8, 0x12, [@generic="b2"]}]}, 0x1c}}, 0x0) 21:25:11 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:11 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:11 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:11 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 366.300543][T22924] netlink: 'syz-executor.1': attribute type 18 has an invalid length. 21:25:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="020d0000100000000000000000000000030006000000000002000000e000000100000000000000000800120002000200000000000000000030006c0003020000ff3f567b0000000000000000000000000000000000000001ac1414bb000000000000000000000000030005000000000002000000e00000010000000000000000"], 0x80}}, 0x0) 21:25:12 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:12 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:12 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:12 executing program 4: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) pipe(&(0x7f0000000400)={0xffffffffffffffff}) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000f7a000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r0, 0x7fff) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000f40000)='/dev/ptmx\x00', 0x200000000101002, 0x0) sendfile(r1, r0, 0x0, 0x100000002) r2 = getpgid(0x0) tkill(r2, 0x1000000000016) 21:25:12 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:12 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x3, &(0x7f0000346fc8)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:12 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:12 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 21:25:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:12 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:13 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 367.615348][T22971] syz-executor.1 (22971) used greatest stack depth: 22520 bytes left 21:25:13 executing program 4: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r1+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:13 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, 0x0, 0x0) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000000), 0xc, &(0x7f0000000540)={&(0x7f00000003c0)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) 21:25:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:13 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x0, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:13 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:13 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:13 executing program 4: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r1+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:13 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x0, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:13 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) [ 368.224561][T22996] syz-executor.1 (22996) used greatest stack depth: 22328 bytes left 21:25:14 executing program 4: r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000280)) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r1+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:14 executing program 1: socketpair(0x0, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002740)}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 21:25:14 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:14 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:14 executing program 4: userfaultfd(0x80800) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 21:25:14 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:14 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:14 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:14 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:14 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) pipe2(&(0x7f0000000000), 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0x19, &(0x7f0000000140)=@assoc_value={r2}, 0x8) 21:25:14 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(0x0, 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:14 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:14 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}}}, 0x2e) sendmmsg(r1, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:15 executing program 4: userfaultfd(0x80800) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x0, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:15 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(0x0, 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:15 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:15 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:15 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@ptr={0x0, 0x0, 0x0, 0x8}]}}, 0x0, 0x26}, 0x20) 21:25:15 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:15 executing program 1: getpid() mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) 21:25:15 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(0x0, 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:15 executing program 2: ioctl$VHOST_SET_VRING_ENDIAN(0xffffffffffffffff, 0x4008af13, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:15 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) semget$private(0x0, 0x0, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) ioctl$SG_SET_TIMEOUT(0xffffffffffffffff, 0x2201, 0x0) listen(r0, 0xfc4004) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCX25GCAUSEDIAG(0xffffffffffffffff, 0x89e6, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x20, 0x0, 0x0) recvmmsg(r1, &(0x7f0000004300)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f00000027c0), 0x1, &(0x7f0000000080)=""/210, 0xfffffd94}}], 0x684, 0x0, &(0x7f0000004480)={0x0, r2+30000000}) ioctl$sock_bt_bnep_BNEPGETCONNINFO(0xffffffffffffffff, 0x800442d3, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, 0x0, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) [ 370.093983][ T2971] libceph: connect (1)[d::]:6789 error -101 [ 370.103378][ T2971] libceph: mon0 (1)[d::]:6789 connect error 21:25:15 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:15 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(0xffffffffffffffff, &(0x7f0000005fc0), 0x800000000000059, 0x0) 21:25:15 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x0, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:15 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:15 executing program 1: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x103, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x9, 0x0, &(0x7f0000000080)) 21:25:16 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xa) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:25:16 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x0, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:16 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0x0) [ 370.648865][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 370.687333][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:16 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 370.722908][T23153] Dead loop on virtual device ip6_vti0, fix it urgently! 21:25:16 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x0, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 370.800631][T23153] Dead loop on virtual device ip6_vti0, fix it urgently! [ 370.832899][T23153] Dead loop on virtual device ip6_vti0, fix it urgently! [ 370.908609][T23153] Dead loop on virtual device ip6_vti0, fix it urgently! [ 370.957073][T23153] Dead loop on virtual device ip6_vti0, fix it urgently! [ 371.014119][T23153] Dead loop on virtual device ip6_vti0, fix it urgently! 21:25:17 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:17 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0x0) 21:25:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x0) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x0, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:17 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:17 executing program 3: timerfd_create(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, 0x1c) syz_open_dev$amidi(0x0, 0x0, 0x0) connect$l2tp(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r1, 0x0, 0x0, 0x0) 21:25:17 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:17 executing program 1: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xa) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) 21:25:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x0) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:17 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x0, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 371.663803][ T2971] libceph: connect (1)[d::]:6789 error -101 [ 371.718310][ T2971] libceph: mon0 (1)[d::]:6789 connect error 21:25:17 executing program 3: socket$alg(0x26, 0x5, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) connect$ax25(0xffffffffffffffff, 0x0, 0x0) gettid() r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='ip6_vti0\x00', 0x10) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendmmsg(r2, &(0x7f0000005fc0), 0x800000000000059, 0xa) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 371.804421][T23190] Dead loop on virtual device ip6_vti0, fix it urgently! 21:25:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x0) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 371.908792][T23196] Dead loop on virtual device ip6_vti0, fix it urgently! [ 371.975770][T23196] Dead loop on virtual device ip6_vti0, fix it urgently! [ 371.999966][T23196] Dead loop on virtual device ip6_vti0, fix it urgently! 21:25:18 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x0, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:18 executing program 1: r0 = socket(0x10, 0x80002, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=""/250, 0xfa}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) 21:25:18 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="020700090200000000000008000000ff032b1d044878b1b9f759d1f8a6af9c0b73693973bfa419f95e5470395fc34bbed4ccfb6313a46294ea781d7437aefd901c64d082b579001fed090f37f734b35b7d179a32920e35bcd7a6d066c93dcb76308155ddcb77687bc026da43747f932485a2520a313749ec4d925c1eb265003021fa530e91a2c40a3683a7f6dd917ed30a0f50f18e901ad79ffa6b7aff05ffff00000000b9589798aeeec8f7ba2a93df8ae1792faa3b4b856bb53b195c4afa6ea83356417622348d7b4ba5cd07436f6d754787c4aa415ae9db7e1d1c35b918d8df0d255ab35f"], 0xe6}}, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x7, &(0x7f0000000300)=0x445, 0x4) membarrier(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) socket$netlink(0x10, 0x3, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 21:25:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:18 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x15, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x13}]}, &(0x7f0000f6bffb)='W*\x00\x00', 0x0, 0xabf543b4162708cd, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x7b7, 0x10, 0x0, 0xfffffe09}, 0x14) 21:25:19 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180), 0x0) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x7}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5}}, 0xe8) connect$inet6(r2, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r2, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000480)=ANY=[@ANYBLOB="020700090200000000000008000000ff032b1d044878b1b9f759d1f8a6af9c0b73693973bfa419f95e5470395fc34bbed4ccfb6313a46294ea781d7437aefd901c64d082b579001fed090f37f734b35b7d179a32920e35bcd7a6d066c93dcb76308155ddcb77687bc026da43747f932485a2520a313749ec4d925c1eb265003021fa530e91a2c40a3683a7f6dd917ed30a0f50f18e901ad79ffa6b7aff05ffff00000000b9589798aeeec8f7ba2a93df8ae1792faa3b4b856bb53b195c4afa6ea83356417622348d7b4ba5cd07436f6d754787c4aa415ae9db7e1d1c35b918d8df0d255ab35f"], 0xe6}}, 0x0) setsockopt$llc_int(0xffffffffffffffff, 0x10c, 0x7, &(0x7f0000000300)=0x445, 0x4) membarrier(0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) socket$netlink(0x10, 0x3, 0x4) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 21:25:19 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-224-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip_vs_stats_percpu\x00') sendfile(r1, r2, 0x0, 0x84c) 21:25:19 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, 0x0, 0x0) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:19 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, 0x0, 0x0) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:19 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc77a4e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507d0419c09fc1fe6c"}, 0xa) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000440)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 21:25:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 373.659446][ T2971] libceph: connect (1)[d::]:6789 error -101 [ 373.667018][ T2971] libceph: mon0 (1)[d::]:6789 connect error 21:25:19 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x638, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, [0xfffffffe]}) [ 373.729994][ T2971] libceph: mon1 (1)[::]:6789 socket error on write 21:25:19 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, 0x0, 0x0) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 373.832021][T23274] device nr0 entered promiscuous mode 21:25:19 executing program 4: userfaultfd(0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r0+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, 0x0, 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:19 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00), 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:19 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:20 executing program 4: userfaultfd(0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r0+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 374.327837][T23274] device nr0 entered promiscuous mode [ 374.707939][ T2971] libceph: mon1 (1)[::]:6789 socket error on write 21:25:20 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00), 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:20 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:20 executing program 4: userfaultfd(0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r0+30000000}, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:20 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x75, 0x1) ioctl$USBDEVFS_SETCONFIGURATION(r0, 0x80045510, &(0x7f0000000000)=0x67fe3afb) 21:25:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, 0x0, 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:20 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00), 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:20 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, 0x0, 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:20 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) close(r0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r2 = accept$alg(r0, 0x0, 0x0) io_setup(0x1, &(0x7f0000e4b000)=0x0) sendmsg$alg(r2, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_submit(r3, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000500)='\x00', 0x1}]) 21:25:21 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(0xffffffffffffffff, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:21 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(0xffffffffffffffff, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) [ 375.658966][ T2971] libceph: mon1 (1)[::]:6789 socket error on write 21:25:21 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:21 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(0xffffffffffffffff, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:21 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:21 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, 0x0, 0x0, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 376.699483][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 376.705463][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:22 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r1+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:22 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:22 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, 0x0, 0x0, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:22 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, 0x0, 0x0, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:22 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:23 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00), 0x0, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 377.659566][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 377.665557][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:23 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:23 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x0, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:23 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00), 0x0, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:23 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:23 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:23 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00), 0x0, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:23 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:24 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:24 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:24 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:24 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de", 0xbe, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 378.699094][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 378.705083][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:24 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de", 0xbe, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:24 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:24 executing program 3: mkdir(0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:24 executing program 1: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:25 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:25 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:25 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de", 0xbe, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(0xffffffffffffffff) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) [ 379.711629][ T8989] libceph: mon1 (1)[::]:6789 socket closed (con state CONNECTING) 21:25:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:25 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:25 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x11d, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(0xffffffffffffffff) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:25 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:26 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:26 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff", 0x11d, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:26 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(0xffffffffffffffff) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) [ 380.726769][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:26 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r1) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:26 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x11d, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:27 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:27 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:27 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x14c, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r1) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) [ 381.658936][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r1) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:27 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:27 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c12", 0x14c, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:28 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:28 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, 0x1c) write$binfmt_script(r0, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:28 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x14c, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:28 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x164, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:28 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 382.698985][ T2971] libceph: connect (1)[d::]:6789 error -101 [ 382.705180][ T2971] libceph: mon0 (1)[d::]:6789 connect error 21:25:29 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:29 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x164, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(0x0, 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:29 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x164, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(0xffffffffffffffff, &(0x7f0000002ec0)={'3! ', './file0'}, 0x3138) 21:25:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) [ 383.664891][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 383.689126][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:29 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 21:25:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:29 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979b", 0x170, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000000)={0xe, 0x1, "050000000001"}, 0x0) 21:25:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) 21:25:29 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) 21:25:29 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:29 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x170, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) write$binfmt_script(r0, 0x0, 0x0) [ 384.698558][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 384.704626][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:30 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:30 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) 21:25:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8ff", 0x23}], 0x1}, 0x0) 21:25:30 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x170, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:30 executing program 2: open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x2e, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) semget(0x3, 0x0, 0x0) 21:25:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:30 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, 0x0, 0x0) [ 385.040760][ T25] audit: type=1800 audit(1575408330.736:50): pid=24346 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=16849 res=0 21:25:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 21:25:30 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x176, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:31 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x8010000000000084) bind$inet6(r0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, @perf_config_ext, 0x4, 0x1ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$TCSETAF(r1, 0x5408, 0x0) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) getgid() ioctl$PIO_UNISCRNMAP(0xffffffffffffffff, 0x4b6a, 0x0) mkdir(&(0x7f00000004c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) r2 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) io_setup(0x9, &(0x7f0000000400)=0x0) ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, 0x0) io_submit(r3, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0xe0400000000000, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000, 0x407000}]) lseek(r2, 0x0, 0x3) 21:25:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:31 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x0, "050000000001"}, 0x0) [ 385.659802][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:31 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 21:25:31 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x0, "050000000001"}, 0x0) 21:25:31 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x176, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) keyctl$KEYCTL_MOVE(0x1e, r0, r0, r1, 0x0) 21:25:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 21:25:31 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xe, 0x0, "050000000001"}, 0x0) 21:25:31 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x176, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:31 executing program 2: r0 = syz_open_dev$dri(&(0x7f00000003c0)='/dev/dri/card#\x00', 0x2, 0x0) ioctl(r0, 0xffffffffffffffb3, &(0x7f0000000080)) 21:25:31 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x1}, 0x0) 21:25:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:32 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 21:25:32 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x179, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:32 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x1}, 0x0) 21:25:32 executing program 2: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(0x0, 0x6, 0x0) ioctl$sock_netrom_SIOCDELRT(r0, 0x890c, 0x0) umount2(&(0x7f0000000400)='./file0\x00', 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\xc9\x03', @ifru_names='bond_slave_1\x00'}) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000002c0), 0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\r\x00\x00\x00\x00\t\x00', @ifru_names='bond_slave_1\x00'}) 21:25:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) [ 386.718624][ T8989] libceph: mon1 (1)[::]:6789 socket closed (con state CONNECTING) 21:25:32 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0x8, 0x1}, 0x0) 21:25:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 21:25:32 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4", 0x179, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x3, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) fcntl$getownex(r1, 0x10, &(0x7f0000000280)) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x9af, 0x4000) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x40303, 0x0, 0x0, 0x8000, 0x0, 0x0, 0xed6f, 0x0, 0x100000000, 0x3e, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x373, 0x100000000, 0x0, 0x0, 0x652f, 0x6, 0xfffffffffffffff8, 0x0, 0x1ff, 0x0, 0x0, 0x200, 0x0, @perf_bp={0x0}, 0x0, 0x3, 0x0, 0x9, 0x0, 0x7, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0xfffffffffffffe25) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) openat$vnet(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vhost-net\x00', 0x2, 0x0) keyctl$get_persistent(0x16, 0x0, r0) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000040)) 21:25:32 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xb, 0x1, "050000"}, 0x0) 21:25:33 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 21:25:33 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x179, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:33 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xb, 0x1, "050000"}, 0x0) 21:25:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:33 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x100028, 0x0, 0x0, 0xfffff018}, {0x80000006}]}, 0x10) 21:25:33 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, 0x0) faccessat(r0, &(0x7f0000000080)='./file0\x00', 0x8, 0x500) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$bt_sco_SCO_OPTIONS(0xffffffffffffffff, 0x11, 0x1, &(0x7f0000000e00)=""/4096, &(0x7f00000002c0)=0x1000) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000280)=@v2={0x5, 0x1, 0x5, 0xd8f, 0x23, "f8c20d894125aa41dc9030aefaea22a25661ef19b6acd1a2a22bb96312f4ecc8b45e2c"}, 0x2d, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000300)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0xc0b8}) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getresuid(0x0, &(0x7f0000000200), &(0x7f0000000140)) sendmsg$TIPC_CMD_GET_BEARER_NAMES(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, 0x0}, 0x91) r2 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r2, &(0x7f0000000800)="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", 0x600) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000180)) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f00000001c0), 0x4) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) socket$inet6_tcp(0xa, 0x1, 0x0) fadvise64(r1, 0x0, 0x4000, 0x0) sendfile(r2, r3, 0x0, 0x10000) 21:25:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180), 0x0) 21:25:33 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xb, 0x1, "050000"}, 0x0) [ 387.709542][ T8989] libceph: mon1 (1)[::]:6789 socket closed (con state CONNECTING) 21:25:33 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17a, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:33 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xd, 0x1, "0500000000"}, 0x0) [ 387.986667][ T25] audit: type=1800 audit(1575408333.666:51): pid=24973 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17073 res=0 21:25:34 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180), 0x0) 21:25:34 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd", 0x17a, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:34 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xd, 0x1, "0500000000"}, 0x0) 21:25:34 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x2) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x4) write(r1, &(0x7f0000000200)='}', 0x1) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000480)='dummy0\x00', 0x10) write$binfmt_misc(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='s'], 0x1) shutdown(r1, 0x1) 21:25:34 executing program 3: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)={0xd, 0x1, "0500000000"}, 0x0) 21:25:34 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17a, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180), 0x0) 21:25:34 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x0, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 388.698607][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 388.706937][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e5295cf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 21:25:34 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:34 executing program 2: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000200)="5500000018007fd500fe01b2a4a280930a06000000a8430891000000390008004000020000dc13382d0000009b7a136ef75afb83de448daa72540d8102d2c55327c43ab8220000060cec4fab91d400000000000000", 0x55}], 0x1}, 0x0) 21:25:34 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 21:25:34 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x0, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:34 executing program 3: perf_event_open(&(0x7f00000003c0)={0x2, 0x70, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='loginuid\x00') write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30}, 0x30) 21:25:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:34 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 21:25:35 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x0, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, 0x0, &(0x7f0000000300)) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) connect$llc(r0, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x200003, 0x7ff}, 0x10) 21:25:35 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:35 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) [ 389.664583][ T8989] libceph: connect (1)[d::]:6789 error -101 21:25:35 executing program 3: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="240000001e0007041dfffd946f610500660000001f000000000008000800a3a20400ff7e", 0x24}], 0x1}, 0x0) [ 389.720073][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:35 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21:25:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}, 0x0) 21:25:35 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'lo\x00', &(0x7f0000000080)=@ethtool_link_settings={0x4d}}) 21:25:35 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}, 0x0) 21:25:35 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21:25:35 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x4, &(0x7f0000000000)=@framed={{}, [@call={0x63, 0x11, 0x4}]}, &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f0000000200)=""/4096, 0x0, 0x4, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:25:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1}, 0x0) 21:25:36 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:36 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:36 executing program 3: mknod(&(0x7f0000000100)='./bus\x00', 0x1040, 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) 21:25:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, 0x0, 0x0) 21:25:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f00007091", 0x12}], 0x1}, 0x0) 21:25:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:36 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000280)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@union={0x0, 0x1, 0x0, 0x5, 0x57f, 0x0, [{0x1}]}]}, {0x0, [0x2e]}}, &(0x7f0000000340)=""/176, 0x33, 0xb0, 0x1}, 0x20) [ 390.698665][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 390.704668][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:36 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:36 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000dc1000)="71e67a15cdf0311cfc093a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) io_setup(0x3, &(0x7f0000000f40)=0x0) io_submit(r2, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000340), 0x87}]) 21:25:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f00007091", 0x12}], 0x1}, 0x0) 21:25:36 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:36 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x0, 0x0) r1 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ashmem\x00', 0x0, 0x0) dup2(r0, r1) 21:25:37 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:37 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f00007091", 0x12}], 0x1}, 0x0) 21:25:37 executing program 3: socket$packet(0x11, 0x0, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000040)='bcsf0\x00') perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) readlinkat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/172, 0xac) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x10000002000091b, 0x0, 0x0) r1 = socket(0xa, 0x80005, 0x0) ioctl$SIOCSIFMTU(r1, 0x8922, &(0x7f0000000000)={'team0\x00', 0x892}) 21:25:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4", 0x1b}], 0x1}, 0x0) 21:25:37 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x0, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) close(r0) [ 391.659938][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:37 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x12) clone(0x0, &(0x7f0000000240), 0x0, &(0x7f00000001c0), &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000580)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x400}}, 0x10) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x200000000000000f, 0x0) 21:25:37 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4", 0x1b}], 0x1}, 0x0) 21:25:37 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x0, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:37 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:37 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) close(r0) 21:25:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4", 0x1b}], 0x1}, 0x0) 21:25:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc6", 0x1f}], 0x1}, 0x0) 21:25:38 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x0, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc6", 0x1f}], 0x1}, 0x0) [ 392.717250][ T8989] libceph: mon1 (1)[::]:6789 socket closed (con state CONNECTING) 21:25:38 executing program 3: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x12) clone(0x0, &(0x7f0000000240), 0x0, &(0x7f00000001c0), &(0x7f0000000040)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000580)) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r2, 0xc0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0x400}}, 0x10) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x200000000000000f, 0x0) 21:25:38 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:38 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) close(r0) 21:25:38 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x0, 0x4, 0x4, 0x0, 0x1}, 0x2c) 21:25:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc6", 0x1f}], 0x1}, 0x0) 21:25:38 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6", 0x21}], 0x1}, 0x0) 21:25:38 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x0, 0x4, 0x0, 0x1}, 0x2c) 21:25:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:39 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x0, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6", 0x21}], 0x1}, 0x0) [ 393.665560][ T8989] libceph: mon1 (1)[::]:6789 socket closed (con state CONNECTING) 21:25:39 executing program 3: setresuid(0x0, 0xee01, 0x0) lookup_dcookie(0x0, 0x0, 0x0) 21:25:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x0, 0x4, 0x0, 0x1}, 0x2c) 21:25:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6", 0x21}], 0x1}, 0x0) 21:25:39 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x0, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:39 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:39 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x17, 0x0, 0x10001, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c}, 0x11) 21:25:39 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8", 0x22}], 0x1}, 0x0) 21:25:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x0, 0x4, 0x0, 0x1}, 0x2c) 21:25:39 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x0, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:39 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)) close(0xffffffffffffffff) 21:25:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x806, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23}, 0x1c) r1 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$IMGETDEVINFO(r1, 0x80044944, &(0x7f0000000080)={0x9}) listen(r0, 0x3) r2 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100)=0x9, 0x4) connect$inet(r2, &(0x7f0000772000)={0x2, 0x4e23}, 0x10) r3 = accept4(r0, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000007940), 0x143, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001500), 0x4000000000002d0, 0x0) 21:25:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8", 0x22}], 0x1}, 0x0) 21:25:40 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x0, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:40 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)) close(0xffffffffffffffff) 21:25:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x2c) [ 394.699431][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 394.712356][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:40 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)="230000005e0081aee4050c00000f0000709110ecab372942b44ee4a0008bc609f6d8", 0x22}], 0x1}, 0x0) 21:25:40 executing program 2: ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)) close(0xffffffffffffffff) 21:25:40 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x0, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:40 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x2c) 21:25:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:40 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='syz1\x00') ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000000c0)='syz0\x00') 21:25:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x50) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000004300)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f00000027c0), 0x1, &(0x7f0000000080)=""/210, 0xfffffd94}}], 0x684, 0xf0ff7f, &(0x7f0000004480)={0x0, r2+30000000}) 21:25:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:40 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x0, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x31, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000340)={0x0, 0x5, 0x9ba5}, &(0x7f0000000380)=0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'nlmon0\x00'}) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x14) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) readv(r1, &(0x7f0000000140)=[{0x0}, {&(0x7f00000000c0)=""/99, 0x63}], 0x2) 21:25:40 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:41 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:41 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x0, &(0x7f0000000400)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'irlan0\x00', 0x200080}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8d4, 0x20}, 0x2c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0xd, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x48, 0x1, 0x88}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0xfb, &(0x7f00001a7f05)=""/251}, 0x14) close(r2) openat$cgroup_procs(r0, &(0x7f0000000100)='tasks\x00', 0x2, 0x0) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='+[vboxnet0trusted\x00', 0xffffffffffffff9c}, 0x10) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000000c0)={'yam0\x00', 0x200}) bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x4, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x2c) 21:25:41 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x0, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0xa, 0x801, 0x84) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r0, 0x50) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000004300)=[{{&(0x7f00000002c0)=@in, 0x80, &(0x7f00000027c0), 0x1, &(0x7f0000000080)=""/210, 0xfffffd94}}], 0x684, 0xf0ff7f, &(0x7f0000004480)={0x0, r2+30000000}) 21:25:41 executing program 3: pipe(0x0) sched_setscheduler(0x0, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) getpgrp(0x0) syz_open_dev$sndseq(0x0, 0x0, 0x1) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_open_dev$amidi(0x0, 0x9c4, 0x70000) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) gettid() r0 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) dup2(r0, 0xffffffffffffffff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r1 = gettid() prctl$PR_SET_PTRACER(0x59616d61, 0x0) r2 = syz_open_dev$sg(0x0, 0x0, 0x40) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000100)}, {0x0}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r2, 0x227d, &(0x7f0000000780)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r1, 0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000200)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x2, 0x0) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, 0x0, 0x0, 0x81003) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r5) sendfile(r3, r4, 0x0, 0x102000004) 21:25:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) [ 395.658631][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 395.664668][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:41 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x0, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(0xffffffffffffffff, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:41 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x1c, 0x32, 0x119, 0x0, 0x0, {0x3}, [@generic="ffd38d9b", @nested={0x4, 0x1}]}, 0x1c}, 0x1, 0xf0ffff}, 0x0) 21:25:41 executing program 5: r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f00000005c0)) syz_mount_image$gfs2(&(0x7f0000000040)='gfs2\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)="ab444e84840bf1b889112717b172c1d0a9f6d0ef626438a807e97f5020ddd6152384abbc42e9a4a96f5011d6954599100a3a690db2d8be8c82278282bbd07a0cd7f12af858398f863746fdc473dedd166c36d1ae027d72954f5df23b7de957d22070a63edb2906e2167b40d1cefc2a06674a5a6001", 0x75, 0x5}], 0x18000, 0x0) syz_mount_image$msdos(&(0x7f0000000180)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0xe800, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000340)='./bus\x00', 0x141042, 0x0) fdatasync(r1) write$binfmt_elf32(r2, &(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x3eb) sendfile(r2, r2, &(0x7f0000000380), 0x1000000020000) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0xcc, 0x0, 0x0) 21:25:41 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) [ 396.165842][T25680] netlink: 'syz-executor.3': attribute type 1 has an invalid length. 21:25:42 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x0, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:42 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) 21:25:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) 21:25:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) [ 396.698710][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 396.705142][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:42 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x0, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:42 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, 0x0) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:42 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) 21:25:42 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:42 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='tracefs\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) lseek(r0, 0x0, 0x4) 21:25:42 executing program 3: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xfffffffffffffffa, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) 21:25:43 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x0, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:43 executing program 5: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x267, 0x0) recvfrom$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/route\x00') preadv(r2, &(0x7f0000000700), 0x31f, 0x10400003) 21:25:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) 21:25:43 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x0, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 397.668634][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:43 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x0, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) 21:25:43 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x0, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:43 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:43 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) 21:25:43 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ptys(0xffffffffffffffff, 0x0, 0x0) 21:25:43 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(0xffffffffffffffff, 0x40047451, &(0x7f0000000000)) close(r0) 21:25:43 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x0, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) [ 398.434941][T25882] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 21:25:44 executing program 3: pipe(&(0x7f00000013c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 21:25:44 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x0, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:44 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, 0x0, &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 398.698929][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) close(r0) 21:25:44 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x0, 0x0, 0x0) 21:25:44 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x0, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:44 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) close(r0) 21:25:44 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x0, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$ttys(0xffffffffffffffff, 0x0, 0x0) 21:25:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) 21:25:45 executing program 5: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) 21:25:45 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x0, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:45 executing program 3: write$RDMA_USER_CM_CMD_LEAVE_MCAST(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r3, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x306, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x28, 0x10, 0x825, 0x0, 0x7000000, {0x0, 0x0, 0x0, r3}, [@IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x28}}, 0x0) open(0x0, 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 399.659007][ T8989] libceph: mon1 (1)[::]:6789 socket error on write [ 399.792546][T25935] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. 21:25:45 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), &(0x7f0000000340)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:45 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:45 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, 0x0) close(r0) 21:25:45 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x0, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:45 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) [ 399.914747][T25936] batman_adv: batadv0: Adding interface: veth3 [ 399.923571][T25936] batman_adv: batadv0: The MTU of interface veth3 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. 21:25:45 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x0, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:45 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) [ 400.086302][T25936] batman_adv: batadv0: Not using interface veth3 (retrying later): interface not active 21:25:45 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:46 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(0xffffffffffffffff) 21:25:46 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x0, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 400.699535][ T5] libceph: connect (1)[d::]:6789 error -101 [ 400.705528][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:25:46 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:46 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x389f2e94d98aae36, 0x0) ioctl$KDGKBLED(r0, 0x80045104, 0x0) 21:25:46 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 21:25:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) 21:25:46 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x0, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(0xffffffffffffffff) 21:25:46 executing program 3: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000003000)='/dev/sequencer2\x00', 0x1, 0x0) ioctl$KDGKBLED(r0, 0xc0046d00, 0x0) 21:25:46 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 21:25:46 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x0, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:46 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$invalidate(0x15, r0) 21:25:46 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000c000100766574680000000018000200fd0001000000000023c0306554362dddcb892ef8051404bde5bf296e3c566a03d724f7ead1ef33adfdbe08b8c5236b93b9797b4409f6e370d1515d2e1fa63259e6d4bd05772981", @ANYRES32=0x0, @ANYBLOB="00000079abd1932a"], 0x48}}, 0x0) 21:25:46 executing program 2: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000000)) close(0xffffffffffffffff) [ 401.295213][T26109] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 401.436526][T26175] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.3'. [ 401.660019][ T5] libceph: connect (1)[d::]:6789 error -101 [ 401.666005][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:25:47 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:47 executing program 5: keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, 0x0) 21:25:47 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x0, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioprio_get$pid(0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000280)={'\x00', 0x6}) fcntl$getownex(r1, 0x10, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r1, &(0x7f0000000200)="055ed7380d8fe1df4774117a171df91e916fce18aa243f37f1388a", 0x1b, 0x80, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000100)={0x0, 'vxcan1\x00', {}, 0x6}) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f0000000040), &(0x7f0000000700)=0x2) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, 0x0, 0x0) keyctl$get_persistent(0x16, 0x0, r0) 21:25:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socket(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f00003b9fdc)) r4 = syz_open_pts(r3, 0x4000000000002) fcntl$dupfd(r3, 0x0, r4) dup3(r4, r3, 0x0) fcntl$setstatus(r4, 0x4, 0x0) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000003c0)="832016f3e1242955d4a75a9743bf082f4684bfa8e0e1428ba2a9508da60715e417348e1eaab0dc3e57fe73eb7f84fe9ad39f01b6283d92704e6f746852ba9338279b59fc7799dd4ed6a3dbdc3cd384b25a7d55bb5cdb97ac5e72fd505ad902032b2f5b1eb22c1a27a7cfcbeade9a72544cdb72174feada1a5669f996c647f587bc3321dd6201c4ba322f6785a3c668296bcb74749b624f452495cfddf7e9013f3a3edf47206f9bd97fc1e55565a62e") r5 = syz_open_pts(r2, 0x4000000000002) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\'#\x00') fcntl$dupfd(r2, 0x0, r5) dup3(r5, r2, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r6, 0x40045431, &(0x7f00003b9fdc)) r7 = syz_open_pts(r6, 0x4000000000002) fcntl$dupfd(r6, 0x0, r7) write$char_usb(0xffffffffffffffff, &(0x7f00000002c0)='\b', 0x1) syz_open_pts(0xffffffffffffffff, 0x0) dup(r1) r8 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000180)={@ipv4={[], [], @loopback}}, 0x0) fallocate(r8, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r8}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="da49bc57ac", @ANYRESHEX=0x0, @ANYBLOB=',nocase,\x00']) 21:25:47 executing program 5: keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, 0x0) 21:25:47 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x0, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:47 executing program 5: keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, 0x0) 21:25:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socket(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x4000000000002) fcntl$dupfd(r3, 0x0, r4) dup3(r4, r3, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000003c0)="832016f3e1242955d4a75a9743bf082f4684bfa8e0e1428ba2a9508da60715e417348e1eaab0dc3e57fe73eb7f84fe9ad39f01b6283d92704e6f746852ba9338279b59fc7799dd4ed6a3dbdc3cd384b25a7d55bb5cdb97ac5e72fd505ad902032b2f5b1eb22c1a27a7cfcbeade9a72544cdb72174feada1a5669f996c647f587bc3321dd6201c4ba322f6785a3c668296bcb74749b624f452495cfddf7e9013f3a3edf47206f9bd97fc1e55565a62e") r5 = syz_open_pts(r2, 0x4000000000002) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\'#\x00') fcntl$dupfd(r2, 0x0, r5) r6 = dup3(r5, r2, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00003b9fdc)) r8 = syz_open_pts(r7, 0x4000000000002) fcntl$dupfd(r7, 0x0, r8) r9 = dup3(r8, r7, 0x0) write$char_usb(r9, &(0x7f00000002c0)='\b', 0x1) syz_open_pts(r9, 0x0) write$char_usb(r6, &(0x7f00000002c0)='\b', 0x1) dup(r1) r10 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000180)={@ipv4={[], [], @loopback}}, 0x0) fallocate(r10, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r10}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="da49bc57", @ANYRESHEX=0x0, @ANYBLOB=',nocase,\x00']) 21:25:48 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x0, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:48 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:48 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:48 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 21:25:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:48 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x0, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:48 executing program 2: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000080), 0x8, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f00000029c0)='/dev/ppp\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000300)=""/246) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000000)) [ 402.665537][T26356] FAT-fs (loop3): Unrecognized mount option "ÚI¼W0x0000000000000000" or missing value [ 402.698526][ T5] libceph: connect (1)[d::]:6789 error -101 [ 402.704550][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:25:48 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:48 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x0, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:48 executing program 5: r0 = add_key$keyring(0x0, &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) syz_open_dev$vcsn(0x0, 0x0, 0x222000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 403.253590][T26396] FAT-fs (loop3): Unrecognized mount option "ÚI¼W0x0000000000000000" or missing value 21:25:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socket(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x4000000000002) fcntl$dupfd(r3, 0x0, r4) dup3(r4, r3, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000003c0)="832016f3e1242955d4a75a9743bf082f4684bfa8e0e1428ba2a9508da60715e417348e1eaab0dc3e57fe73eb7f84fe9ad39f01b6283d92704e6f746852ba9338279b59fc7799dd4ed6a3dbdc3cd384b25a7d55bb5cdb97ac5e72fd505ad902032b2f5b1eb22c1a27a7cfcbeade9a72544cdb72174feada1a5669f996c647f587bc3321dd6201c4ba322f6785a3c668296bcb74749b624f452495cfddf7e9013f3a3edf47206f9bd97fc1e55565a62e") r5 = syz_open_pts(r2, 0x4000000000002) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\'#\x00') fcntl$dupfd(r2, 0x0, r5) r6 = dup3(r5, r2, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00003b9fdc)) r8 = syz_open_pts(r7, 0x4000000000002) fcntl$dupfd(r7, 0x0, r8) r9 = dup3(r8, r7, 0x0) write$char_usb(r9, &(0x7f00000002c0)='\b', 0x1) syz_open_pts(r9, 0x0) write$char_usb(r6, &(0x7f00000002c0)='\b', 0x1) dup(r1) r10 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000180)={@ipv4={[], [], @loopback}}, 0x0) fallocate(r10, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r10}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="da49bc57", @ANYRESHEX=0x0, @ANYBLOB=',nocase,\x00']) 21:25:49 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x0, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:49 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 21:25:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:49 executing program 2: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) open(0x0, 0x0, 0x0) r0 = getpid() sched_setattr(r0, 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r3, 0x407, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3, 0x0, 0xfffffffffffffffb}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = socket$unix(0x1, 0x1, 0x0) connect(r5, &(0x7f0000000000)=@un=@abs={0x1, 0x0, 0x4e22}, 0x80) accept(r1, &(0x7f0000001b80)=@xdp, &(0x7f00000001c0)=0x80) sendmmsg$inet(r4, &(0x7f0000002440)=[{{0x0, 0x0, 0x0}}, {{&(0x7f0000002280)={0x2, 0x4f24, @broadcast}, 0x10, &(0x7f0000002400)=[{&(0x7f0000002380)}], 0x1}}], 0x2, 0x140060c4) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) io_setup(0x8, &(0x7f00000004c0)=0x0) io_submit(r6, 0xc2, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000000), 0x10000}]) 21:25:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:49 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0x0, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) [ 403.660084][ T5] libceph: mon1 (1)[::]:6789 socket error on write 21:25:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socket(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x4000000000002) fcntl$dupfd(r3, 0x0, r4) dup3(r4, r3, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000003c0)="832016f3e1242955d4a75a9743bf082f4684bfa8e0e1428ba2a9508da60715e417348e1eaab0dc3e57fe73eb7f84fe9ad39f01b6283d92704e6f746852ba9338279b59fc7799dd4ed6a3dbdc3cd384b25a7d55bb5cdb97ac5e72fd505ad902032b2f5b1eb22c1a27a7cfcbeade9a72544cdb72174feada1a5669f996c647f587bc3321dd6201c4ba322f6785a3c668296bcb74749b624f452495cfddf7e9013f3a3edf47206f9bd97fc1e55565a62e") r5 = syz_open_pts(r2, 0x4000000000002) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\'#\x00') fcntl$dupfd(r2, 0x0, r5) r6 = dup3(r5, r2, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00003b9fdc)) r8 = syz_open_pts(r7, 0x4000000000002) fcntl$dupfd(r7, 0x0, r8) r9 = dup3(r8, r7, 0x0) write$char_usb(r9, &(0x7f00000002c0)='\b', 0x1) syz_open_pts(r9, 0x0) write$char_usb(r6, &(0x7f00000002c0)='\b', 0x1) dup(r1) r10 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000180)={@ipv4={[], [], @loopback}}, 0x0) fallocate(r10, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r10}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="da49bc57", @ANYRESHEX=0x0, @ANYBLOB=',nocase,\x00']) 21:25:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, r0) 21:25:49 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0x0, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:49 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, r0) [ 404.189820][T26408] FAT-fs (loop3): Unrecognized mount option "ÚI¼W0x0000000000000000" or missing value 21:25:50 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="00cd0f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000180), 0xfffffffffffffef5}], 0x3}}], 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b21a938fca74eca5291e19714e73efde72b26a9ece9cc50aaa17134b256e8a8ce58890ecb917c4c59c8b4a8bec4a2a79ff9687a39707790617401293e890bb2a1e6902b6c3c0c39d6f66923fa6fa523f1a5d79039179aa55490f508175240493bdbd8f372b2fcc9e191db044d0e5e5bfac0f0d9bb4c83b8df3d610430900000041aa7c3d71184549a2418c481a00dcc176f1717cd642efa900"/166, @ANYRES32, @ANYRES16, @ANYRES32, @ANYPTR64], 0x0, 0xb8}, 0x20) tkill(r2, 0x3b) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) 21:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 404.465338][T26650] ptrace attach of "/root/syz-executor.3"[26649] was attempted by "/root/syz-executor.3"[26650] 21:25:50 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 21:25:50 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0x0, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socket(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x4000000000002) fcntl$dupfd(r3, 0x0, r4) dup3(r4, r3, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000003c0)="832016f3e1242955d4a75a9743bf082f4684bfa8e0e1428ba2a9508da60715e417348e1eaab0dc3e57fe73eb7f84fe9ad39f01b6283d92704e6f746852ba9338279b59fc7799dd4ed6a3dbdc3cd384b25a7d55bb5cdb97ac5e72fd505ad902032b2f5b1eb22c1a27a7cfcbeade9a72544cdb72174feada1a5669f996c647f587bc3321dd6201c4ba322f6785a3c668296bcb74749b624f452495cfddf7e9013f3a3edf47206f9bd97fc1e55565a62e") r5 = syz_open_pts(r2, 0x4000000000002) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\'#\x00') fcntl$dupfd(r2, 0x0, r5) r6 = dup3(r5, r2, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00003b9fdc)) r8 = syz_open_pts(r7, 0x4000000000002) fcntl$dupfd(r7, 0x0, r8) r9 = dup3(r8, r7, 0x0) write$char_usb(r9, &(0x7f00000002c0)='\b', 0x1) syz_open_pts(r9, 0x0) write$char_usb(r6, &(0x7f00000002c0)='\b', 0x1) dup(r1) r10 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000180)={@ipv4={[], [], @loopback}}, 0x0) fallocate(r10, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r10}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="da49bc57", @ANYRESHEX=0x0, @ANYBLOB=',nocase,\x00']) 21:25:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, r0) 21:25:50 executing program 3: 21:25:50 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, 0x0) keyctl$invalidate(0x15, r0) 21:25:50 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x0, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:50 executing program 3: [ 404.698865][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:50 executing program 3: 21:25:50 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x0, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) socket(0xa, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r1 = socket(0xa, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x80000000000004c, &(0x7f0000b34ffc)=0x1000000, 0x4) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r4 = syz_open_pts(r3, 0x4000000000002) fcntl$dupfd(r3, 0x0, r4) dup3(r4, r3, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) ioctl$PIO_FONT(r4, 0x4b61, &(0x7f00000003c0)="832016f3e1242955d4a75a9743bf082f4684bfa8e0e1428ba2a9508da60715e417348e1eaab0dc3e57fe73eb7f84fe9ad39f01b6283d92704e6f746852ba9338279b59fc7799dd4ed6a3dbdc3cd384b25a7d55bb5cdb97ac5e72fd505ad902032b2f5b1eb22c1a27a7cfcbeade9a72544cdb72174feada1a5669f996c647f587bc3321dd6201c4ba322f6785a3c668296bcb74749b624f452495cfddf7e9013f3a3edf47206f9bd97fc1e55565a62e") r5 = syz_open_pts(r2, 0x4000000000002) prctl$PR_SET_NAME(0xf, &(0x7f0000000240)='\'#\x00') fcntl$dupfd(r2, 0x0, r5) r6 = dup3(r5, r2, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r7, 0x40045431, &(0x7f00003b9fdc)) r8 = syz_open_pts(r7, 0x4000000000002) fcntl$dupfd(r7, 0x0, r8) r9 = dup3(r8, r7, 0x0) write$char_usb(r9, &(0x7f00000002c0)='\b', 0x1) syz_open_pts(r9, 0x0) write$char_usb(r6, &(0x7f00000002c0)='\b', 0x1) dup(r1) r10 = creat(&(0x7f0000000000)='./file0\x00', 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000180)={@ipv4={[], [], @loopback}}, 0x0) fallocate(r10, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r10}) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="da49bc57", @ANYRESHEX=0x0, @ANYBLOB=',nocase,\x00']) 21:25:51 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 21:25:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, 0x0) 21:25:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:51 executing program 3: 21:25:51 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x0, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu\x02\xc2tct\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x2343a726) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) r1 = socket$inet6(0xa, 0x80003, 0x6b) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0805b5055e0bcfe8474071") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cpu\x02\xc2tct\x00', 0x275a, 0x0) 21:25:51 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080)=0xd00, 0x15d4b87) 21:25:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, 0x0) 21:25:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:51 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x0, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 405.695312][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:51 executing program 5: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$revoke(0x3, r0) keyctl$invalidate(0x15, 0x0) 21:25:51 executing program 2: 21:25:52 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 21:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:52 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x0, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:52 executing program 5: 21:25:52 executing program 2: 21:25:52 executing program 3: 21:25:52 executing program 5: 21:25:52 executing program 3: 21:25:52 executing program 2: 21:25:52 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:52 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x0, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:52 executing program 5: [ 406.701140][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 406.723863][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:53 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 21:25:53 executing program 2: 21:25:53 executing program 3: 21:25:53 executing program 5: 21:25:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:53 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x0, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:53 executing program 5: 21:25:53 executing program 3: 21:25:53 executing program 2: 21:25:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:53 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x0, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:53 executing program 2: [ 407.668680][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 407.677559][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:53 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 21:25:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:53 executing program 5: 21:25:53 executing program 3: 21:25:53 executing program 2: 21:25:53 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x0, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:53 executing program 3: 21:25:54 executing program 5: 21:25:54 executing program 2: 21:25:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:54 executing program 3: 21:25:54 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x0, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 408.699155][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 408.705182][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:54 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 21:25:54 executing program 2: 21:25:54 executing program 5: 21:25:54 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x141042, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x103, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[], 0x2e7) r1 = openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) r2 = fanotify_init(0x0, 0x0) fanotify_mark(r2, 0x11, 0x2, r1, 0x0) sendfile(r0, r0, &(0x7f0000000480), 0xa198) 21:25:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:54 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x0, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:54 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20000000) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3f, 0x20000) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x6}, 0x8) socket$kcm(0x29, 0x5, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) accept(r1, &(0x7f0000000580)=@pppol2tpin6, &(0x7f00000003c0)=0x80) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000380)={r3, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0xfffffffeffffffff], 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)=[0x9, 0x4, 0x3, 0x36, 0x1]}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f00000006c0)={&(0x7f0000000680)=[0x39df, 0x1ff, 0x400000004, 0x1, 0x1], 0x5, 0x7fffffff, 0x80000001, 0x3, 0x0, 0x8, {0x4, 0xd68, 0x3, 0x2b, 0x41, 0x3, 0x81, 0x8, 0x0, 0x100000000, 0x3, 0x101, 0x2, 0x3cad, "59d7c6c4115e40040654c0110d92273cbcf4716a7121d484101b9d096bae9851"}}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/11, 0xb) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000400), &(0x7f0000000440)=0x4) 21:25:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 409.223571][ T25] audit: type=1804 audit(1575408354.916:52): pid=27112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir775900092/syzkaller.SdckIx/393/file0" dev="sda1" ino=17517 res=1 21:25:55 executing program 2: recvmsg$can_raw(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001540)=""/189, 0xbd}, 0x0) clone(0x4000000006ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='stat\x00') exit(0x0) preadv(r0, &(0x7f0000000500), 0x37d, 0x0) 21:25:55 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x0, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 409.486457][ T25] audit: type=1804 audit(1575408355.176:53): pid=27112 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir775900092/syzkaller.SdckIx/393/file0" dev="sda1" ino=17517 res=1 21:25:55 executing program 3: openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='/\x02rou\xfdbE|&\xf9\xea\xc3p.stap\x00', 0x2761, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000480)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\x00\x00\x00\x00\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4020940d, &(0x7f0000000200)={0x3, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}) 21:25:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 409.660028][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:55 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 21:25:55 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x0, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:55 executing program 5: r0 = perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x20000000) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3f, 0x20000) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000001c0)={0x0, 0x6}, 0x8) socket$kcm(0x29, 0x5, 0x0) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) accept(r1, &(0x7f0000000580)=@pppol2tpin6, &(0x7f00000003c0)=0x80) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r2, 0xc0406429, &(0x7f0000000380)={r3, 0x0, 0x0, &(0x7f0000000180)=[0x0, 0xfffffffeffffffff], 0x0, 0x0, 0x1, 0x0, &(0x7f0000000280)=[0x9, 0x4, 0x3, 0x36, 0x1]}) ioctl$DRM_IOCTL_MODE_SETCRTC(0xffffffffffffffff, 0xc06864a2, &(0x7f00000006c0)={&(0x7f0000000680)=[0x39df, 0x1ff, 0x400000004, 0x1, 0x1], 0x5, 0x7fffffff, 0x80000001, 0x3, 0x0, 0x8, {0x4, 0xd68, 0x3, 0x2b, 0x41, 0x3, 0x81, 0x8, 0x0, 0x100000000, 0x3, 0x101, 0x2, 0x3cad, "59d7c6c4115e40040654c0110d92273cbcf4716a7121d484101b9d096bae9851"}}) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) keyctl$get_security(0x11, 0x0, &(0x7f0000000200)=""/11, 0xb) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000400), &(0x7f0000000440)=0x4) 21:25:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000340)={0xa, 0x4e23}, 0x1c) listen(r0, 0xffefffffffffff7f) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000140)='0', 0x1, 0x0, &(0x7f0000000000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000200), &(0x7f00000000c0)=0x98) 21:25:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:56 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x0, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:56 executing program 2: semget$private(0x0, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'cmac(sm4)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="649c47ad46390dc86dae79fa409d4d54", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000080)={0x0, 0x153, &(0x7f00000000c0)={&(0x7f0000000240)={0x68, 0x0, 0x0, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x0, @media='udp\x00'}}}}, 0xffb6}}, 0x0) 21:25:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r0, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:56 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000480)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhci\x00', 0x2000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000005c0)=0x0) getpgid(r2) r3 = openat$cgroup_ro(r0, &(0x7f0000000c00)='cpuacct.usage_user\x00\xe8\xe4\x99\xcc\xaf\xd7\x14\x02\xeaO|\xfc\x16\x88z\xeb\xd4\xfa\xd6C2\xc6\xf5TO\xa6_\f\xaa\x80\xdf\xae\xb0t\xa2U\xb0\x90\x97rK\x8d\x89\xe0Z\xaf\x915\xdc=\xbbo\x17+N\xa9\xda\xf3\xcf\xc3/\xbb\xb2\'\xb5\xd0y\x88\x84\xf70xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 21:25:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:56 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:56 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0x14, 0x2, [@gre_common_policy=[@IFLA_GRE_ERSPAN_DIR={0x8}, @IFLA_GRE_ERSPAN_VER={0x8, 0x16, 0x2}]]}}}]}, 0x40}}, 0x0) 21:25:56 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x0, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 411.166256][T27405] netlink: 'syz-executor.5': attribute type 23 has an invalid length. [ 411.192558][T27405] netlink: 'syz-executor.5': attribute type 22 has an invalid length. 21:25:56 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:57 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x0, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:57 executing program 3: r0 = perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x4) setsockopt$SO_RDS_TRANSPORT(r2, 0x114, 0x8, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) syncfs(0xffffffffffffffff) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x1, 0x6, 0x1, 0x2, 0xfffffffffffffc01, 0x5}) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) getpid() fcntl$addseals(r0, 0x409, 0xa) socket$kcm(0x2, 0x0, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x20000000) socket$kcm(0x29, 0x4000000000000002, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000100)={0x18, 0xd, 0x2, {{0x0, 0x0, 0x1}, 0x100000000}}, 0x18) bind$nfc_llcp(r3, &(0x7f00000003c0)={0x27, 0x0, 0x2, 0x7, 0x3f, 0x7, "9e0cefc7b41afc18e41bc1ec9e1432a1fe75ac11b09da23f1ac9cab05b35d76c5c553a9a7e8ff5a749bd6a286e762f1c34ff88a5da805cfb4243b85f8354e0", 0x7}, 0x60) pwrite64(r3, &(0x7f0000000240)="860500dacd82344d6349413f6313475f59105a54b739a3a46082bc42f81591e398977f8df192e2354deceac9283db627b1c0ad4884003da9a574a793256f705188a99aecdb64d5e3af1fff8bede4fb7fbcd43109902209381cea02d30d73a19c0996d755d51c5c9a881ba7ed2c9d93283e00a172991a33893e9cb5ef08af7a50dcfa846241ab", 0x86, 0x0) 21:25:57 executing program 5: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) symlink(&(0x7f0000000280)='./file1\x00', &(0x7f0000000340)='./file0/f.le.\x00') lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0/f.le.\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000880), 0x24, 0x0) 21:25:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:57 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:57 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x0, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 411.660246][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:25:57 executing program 4: userfaultfd(0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) socket$inet_smc(0x2b, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000003c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x64}, 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 21:25:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:57 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x7a, 0xa, 0xff00}}, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xfd13, &(0x7f0000000000)=""/195}, 0x48) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) getsockopt$inet_buf(r0, 0x0, 0x29, &(0x7f0000000000)=""/145, &(0x7f0000000100)=0x91) 21:25:57 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:57 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x80000000) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0xa400295c) creat(&(0x7f0000000040)='./file0/file0\x00', 0x0) 21:25:57 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x0, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:57 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:57 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:57 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x0, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xcc) close(r1) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000cc0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 21:25:58 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00\x8c\xefF\xda\xa7\xd7\xe8\x90\xa4\xeaSJ\xee\xec\x16&\n\x1d\\m\xda\xda\x16\xc4\xda\x87I\xfc\x11\xfbL\xf3E\x80\xd4\xc1\x9a\xa2\x9fV\x8cDH\xcd\xe9\xcd?U\xbe\x8cn6b\x87\xf1M\xa9\x11\x0f*V\x11^\xc7\xbb\x17\xf9\xa2\xc0\\\xb1\x80\x19\x0f\xd3R\xdcZ\xa4J\xe8\xd0h\fM\xd1\xd4;\xa5\xe0I\x1a\xbd\xe3\x18\x1a\x1e\x1c\"\xafO\xb1\xc1\x8a\xa0.sGr]N?\xde\xb1\x9f\x1e\\>\x98\xfb\xc9r\f\xbd\xabF\xeb\x1a[\xf8\xf3\xc5\x80[\xf1\xceh@\x8a\xe4\xb4\x03\rz\xac\x91\xe3P\x9f\xd8\xc3\xd0\x9ee\x91\x7f3&\xa5\x9a,\xff\xd1\x8c\x95', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xc0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000100)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r2, 0x1800000000000000, 0x47, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d84648a27f11c72be049eb4be1977d486a72d7363417ef6c9079a2ea9747b34bd1d6e1", &(0x7f0000000400)=""/41, 0x100}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x0, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x2b5) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000180), 0x4) 21:25:58 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 412.559208][T27586] sctp: [Deprecated]: syz-executor.5 (pid 27586) Use of int in maxseg socket option. [ 412.559208][T27586] Use struct sctp_assoc_value instead [ 412.708736][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 412.714844][ T8989] libceph: mon0 (1)[d::]:6789 connect error [ 412.833129][T27594] sctp: [Deprecated]: syz-executor.5 (pid 27594) Use of int in maxseg socket option. [ 412.833129][T27594] Use struct sctp_assoc_value instead 21:25:58 executing program 5: r0 = socket$kcm(0x2, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) openat$cgroup_type(r3, &(0x7f0000000080)='cgroup.type\x00', 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000280)='tasks\x00\x8c\xefF\xda\xa7\xd7\xe8\x90\xa4\xeaSJ\xee\xec\x16&\n\x1d\\m\xda\xda\x16\xc4\xda\x87I\xfc\x11\xfbL\xf3E\x80\xd4\xc1\x9a\xa2\x9fV\x8cDH\xcd\xe9\xcd?U\xbe\x8cn6b\x87\xf1M\xa9\x11\x0f*V\x11^\xc7\xbb\x17\xf9\xa2\xc0\\\xb1\x80\x19\x0f\xd3R\xdcZ\xa4J\xe8\xd0h\fM\xd1\xd4;\xa5\xe0I\x1a\xbd\xe3\x18\x1a\x1e\x1c\"\xafO\xb1\xc1\x8a\xa0.sGr]N?\xde\xb1\x9f\x1e\\>\x98\xfb\xc9r\f\xbd\xabF\xeb\x1a[\xf8\xf3\xc5\x80[\xf1\xceh@\x8a\xe4\xb4\x03\rz\xac\x91\xe3P\x9f\xd8\xc3\xd0\x9ee\x91\x7f3&\xa5\x9a,\xff\xd1\x8c\x95', 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0xc0, 0x0) ioctl$TUNSETFILTEREBPF(0xffffffffffffffff, 0x800454e1, &(0x7f0000000100)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000540)={r2, 0x1800000000000000, 0x47, 0x29, &(0x7f0000000440)="b90703e6680d698cb89e40f02cead5dc57ee41dea43e63a377fb8a977c3f1d1700040000d84648a27f11c72be049eb4be1977d486a72d7363417ef6c9079a2ea9747b34bd1d6e1", &(0x7f0000000400)=""/41, 0x100}, 0x28) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)}], 0x1}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000140)=@ipx={0x4, 0x0, 0x0, "0950fe4adba7"}, 0x16, &(0x7f0000000000), 0x0, &(0x7f0000000240)}, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)=@sco={0x1f, {0x8, 0x0, 0x2}}, 0x80, &(0x7f0000000300)}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000), 0x2b5) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000003840)=[{&(0x7f00000004c0)=""/158, 0x9e}, {&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000002740)=""/98, 0x62}, {&(0x7f00000027c0)=""/4096, 0x1000}, {&(0x7f00000037c0)=""/115, 0x73}], 0x5}, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r0, 0x84, 0xd, &(0x7f0000000180), 0x4) 21:25:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x223, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x23, &(0x7f0000000280), 0xcc) close(r1) r2 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000a80), 0x4) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000cc0), 0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) 21:25:58 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:58 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x0, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000600)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xa}) 21:25:58 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x39, &(0x7f0000e86000)="0022040000ffffebfffffffeffffffff144e0000ff000207835eebf116b208feefaf234b4ff8b4cc4c39bdc8451792b903f4b7d8c8cf2153622652328c19ef68234f905557c4070000008735e9ab2f77c62e0a5cdd2cf9984c070400000000000003ff23353d8b2fc6a3ae1ebfcb49004a3ccd3560ae01010000079c60ed7449b842f3e253be8a62b37f820fe75a9ea937ea4e2540019ccbd9f6672837496d00ad7765abaac2ec0f91c88a1ea1ff6ee308c72febedcf00798d41991ac25bb6fce2220c25ea380c7e112ab358c3a6bd8a59c100000001b4e82cb03419544a3988bc226a85abe6eb60cd7cf8d103d38c31c7c86d16c4d86cbe4ab390c092d077ce70590fbbd4f8bf4d6ab1cea6dbe9d4a54c17aac0db6e3845", 0x118) connect$inet6(r0, &(0x7f0000aacfe4), 0x1c) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xb) 21:25:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 413.180319][T27621] sctp: [Deprecated]: syz-executor.5 (pid 27621) Use of int in maxseg socket option. [ 413.180319][T27621] Use struct sctp_assoc_value instead 21:25:58 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x0, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'crc32-pclmul\x00'}, 0x58) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) write$rfkill(r1, &(0x7f0000000000)={0x6, 0x8, 0x2, 0x0, 0x1}, 0x8) splice(r0, 0x0, r3, 0x0, 0x20000000003, 0x0) 21:25:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 413.658698][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 413.664715][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:25:59 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:25:59 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000011c0)={0xb, 0x75, 0x1}, 0xb) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) ioctl$VHOST_SET_VRING_ADDR(0xffffffffffffffff, 0x4028af11, &(0x7f0000001140)={0x0, 0x1, &(0x7f0000000080)=""/74, 0x0, 0x0}) mount(0x0, &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) 21:25:59 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x0, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:59 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'streebog256-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ipv6_route\x00') sendfile(r1, r2, 0x0, 0x1000007ffff07a) 21:25:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:25:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:25:59 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x0, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:25:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x3, 0x0, @ipv4}, 0x1c) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0x2f, "c6cfd2f19e5a504600bdc03a514044447b3c469b240e3dbada597b1287582bc612598a1179a2370333839ff01498be"}, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x11, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) 21:25:59 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x800000000004, 0x2dfff8cef9e98d32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:25:59 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x2020, 0x1) 21:26:00 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x0, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x1c) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x100) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000200)={0x20000000}) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r2, &(0x7f0000000540), 0x0, 0x0, 0x0, 0x0) r3 = dup(0xffffffffffffffff) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000000), 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 21:26:00 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 414.700608][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 414.706668][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:26:00 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x0, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:00 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:00 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x2020, 0x1) 21:26:00 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:00 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x0, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:00 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:01 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'eql\x00\x00\x04\x00\x00\x00\x03\x00\x00\x00\xf2\a\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r2, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000180)='\f', 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000200)={'eql\x00`\x00\xa9[,\x00\x14\x01\x03\x03\xf0\x00', @ifru_mtu=0x1}) 21:26:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x2020, 0x1) 21:26:01 executing program 2: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:01 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x0, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) [ 415.659626][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:26:01 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x0, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:01 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) 21:26:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mknod$loop(&(0x7f00000000c0)='./file0/file0\x00', 0x2020, 0x1) 21:26:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:01 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) [ 416.698721][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:26:02 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51632e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb0ed0ec4ce10816dcd91d6f51245eae70605ec5641f4ac", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:26:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:02 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) 21:26:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:02 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x0, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:02 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@ipv6_newaddr={0x34, 0x14, 0x109, 0x0, 0x0, {}, [@IFA_FLAGS={0x8}, @IFA_ADDRESS={0xf, 0x1, @local}]}, 0xffb5}}, 0x0) 21:26:02 executing program 4: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000000)=0xffffffffffffffff, 0x4) 21:26:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:02 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:03 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x0, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:03 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x80, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f00000002c0)=0x7ff) ioctl$TUNSETLINK(r1, 0x400454cd, 0x31b) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r3 = socket$kcm(0x29, 0x5, 0x0) r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000700)={0x2, 0x70, 0x0, 0x1, 0x40, 0x9, 0x0, 0x1, 0x1002, 0x9, 0x400, 0x400, 0x61a3, 0x3, 0x8, 0x4, 0x9, 0xa4, 0x0, 0x10000, 0x7, 0x8, 0x9, 0x80, 0xfff, 0x2, 0x0, 0x0, 0x1, 0x3, 0x1, 0xfffffffffffffffd, 0xd178, 0x3, 0x8, 0x0, 0xff, 0x1ff, 0x0, 0x20, 0x6, @perf_bp={&(0x7f00000004c0), 0xa}, 0x12000, 0x4121f61b, 0x4, 0x7, 0x3, 0x0, 0x5ed}, r4, 0xb, 0xffffffffffffff9c, 0xa) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$capi20_data(r2, &(0x7f00000001c0)={{0x10, 0xfffff600}}, 0x12) ioctl$VHOST_VSOCK_SET_GUEST_CID(0xffffffffffffffff, 0x4008af60, &(0x7f0000000600)={@hyper}) accept4(r1, &(0x7f00000001c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x80, 0x80800) socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) r5 = creat(&(0x7f0000000540)='./file0\x00', 0x100000001) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000780)='trusted.overlay.redirect\x00', &(0x7f00000007c0)='./file0\x00', 0x8, 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000100)={{0x6, 0xc1, 0x10001, 0x3, 0x3}, 0x4}) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r5, &(0x7f0000000480)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800800}, 0xc, &(0x7f0000000400)={&(0x7f00000006c0)={0x1c, r6, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000340)='TIPCv2\x00') ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r1, 0x40045730, &(0x7f0000000440)) connect$unix(r5, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e23}, 0x6e) 21:26:03 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, 0x0, 0x0) [ 417.658927][ T8989] libceph: mon1 (1)[::]:6789 socket error on write [ 417.687603][T27914] device nr0 entered promiscuous mode [ 418.699572][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 418.705671][ T8989] libceph: mon0 (1)[d::]:6789 connect error [ 419.661847][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 419.667848][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:26:05 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51632e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb0ed0ec4ce10816dcd91d6f51245eae70605ec5641f4ac", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:26:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:05 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x0, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:05 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:05 executing program 4: sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x0, 0x0, 0x0, 0x5}, 0x0) r0 = socket$inet6(0xa, 0x80003, 0xff) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x2b) io_setup(0x26, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000356ff0)=[&(0x7f00000000c0)={0x2c, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000040), 0x354}]) 21:26:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x2284, &(0x7f0000001540)={0x0, 0x0, 0x25}) 21:26:05 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:06 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51632e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb0ed0ec4ce10816dcd91d6f51245eae70605ec5641f4ac", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:26:06 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x0, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:06 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0xfe0d, 0xfa00, {0x0, &(0x7f0000000040), 0x0, 0xb}}, 0x20) sendfile(r0, r0, &(0x7f00000000c0), 0x8080fffffffe) 21:26:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r1, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:06 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x0, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 420.699749][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 420.706153][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:26:06 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:06 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) lstat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:06 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x0, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 421.669960][ T8989] libceph: mon1 (1)[::]:6789 socket error on write [ 422.702446][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:26:09 executing program 3: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000100)="0d00000000003639408fa3a3ba27660199159dff5112fbcce9a6981a14a3e260c650b5edacdec6fdb69d5a415918beba0c51a72f0100d9441e2173a65a48530607c748dc7fc4f4b52b07155fcb2aa544534d14dc0acc24d6c010628ab7073496678d306bed51632e36ff47694d24ec89f61c738002fcf0cf3ace8350410df57c2938a70b0c56bb5bf8b6eff51a32ed5abe14bfd774aefac8668051a8dfaca5d2412b6827f4bbea342ffdb88978ebef12a1bd1d979d6ea7c3ecb0ed0ec4ce10816dcd91d6f51245eae70605ec5641f4ac", 0xd0}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 21:26:09 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:09 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x0, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:09 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x77, 0x1, 0x2}, 0xb) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tee(r0, r0, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@remote, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000000)=0xe8) r3 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x7ff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'gretap0\x00', 0xfffffffffffffffc}, 0x153) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @broadcast}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0xa, {0x2, 0x4e24, @broadcast}, 'syzkaller1\x00'}) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1fff, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@smackfshat={'smackfshat', 0x3d, '}-em0cgroup]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/fb0\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '[posix_acl_access\x87'}}, {@subj_user={'subj_user', 0x3d, '\xb8-'}}]}}) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) 21:26:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:09 executing program 2: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:09 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x0, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:09 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) [ 423.667487][ T8989] libceph: mon1 (1)[::]:6789 socket error on write 21:26:09 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:09 executing program 2: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) [ 424.700247][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 424.706271][ T8989] libceph: mon0 (1)[d::]:6789 connect error [ 425.661820][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 425.667962][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:26:12 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x77, 0x1, 0x2}, 0xb) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tee(r0, r0, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@remote, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000000)=0xe8) r3 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x7ff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'gretap0\x00', 0xfffffffffffffffc}, 0x153) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @broadcast}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0xa, {0x2, 0x4e24, @broadcast}, 'syzkaller1\x00'}) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1fff, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@smackfshat={'smackfshat', 0x3d, '}-em0cgroup]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/fb0\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '[posix_acl_access\x87'}}, {@subj_user={'subj_user', 0x3d, '\xb8-'}}]}}) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) 21:26:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:12 executing program 2: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40a85321, &(0x7f0000000280)={{0xffffffffffffff80}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_int(r1, 0x1, 0x200000010, &(0x7f00000002c0)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:12 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x0, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:12 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(0xffffffffffffffff, 0x800443d2, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{}]}) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) write$P9_RWRITE(0xffffffffffffffff, &(0x7f00000002c0)={0xb, 0x77, 0x1, 0x2}, 0xb) r2 = socket$inet_tcp(0x2, 0x1, 0x0) tee(r0, r0, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000000c0)={{{@in=@remote, @in=@dev}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000000)=0xe8) r3 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x7ff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'gretap0\x00', 0xfffffffffffffffc}, 0x153) ioctl$sock_inet_SIOCGARP(r3, 0x8954, &(0x7f0000000340)={{0x2, 0x4e20, @broadcast}, {0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0xa, {0x2, 0x4e24, @broadcast}, 'syzkaller1\x00'}) mount$9p_fd(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000280)='9p\x00', 0x1fff, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache='cache=fscache'}], [{@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@smackfshat={'smackfshat', 0x3d, '}-em0cgroup]'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/fb0\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '[posix_acl_access\x87'}}, {@subj_user={'subj_user', 0x3d, '\xb8-'}}]}}) ioctl(r2, 0x800000000008982, &(0x7f0000000080)) 21:26:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, 0x0) [ 426.698606][ T8989] libceph: connect (1)[d::]:6789 error -101 [ 426.718264][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:26:12 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x0, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:12 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:12 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:12 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, 0x0) 21:26:13 executing program 3: gettid() sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) gettid() sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet6(0xa, 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) socket(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getgid() getgid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) gettid() sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) sendmsg$sock(r1, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000b80)=[{0x0}, {&(0x7f0000000b40)="cc0004b41ece4bba9770befebb3520104bd32c10a73f84e0c8c28fe2f74d57d8b3d514616ecb3d72ad882932e78da5", 0x2f}], 0x2}, 0x4004045) splice(r1, 0x0, r0, 0x0, 0x60000, 0x0) 21:26:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x0, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, 0x0) 21:26:13 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_set$uid(0x3, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f00000003c0)='./file0\x00', 0xe800, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010a0200027400f801", 0x17}], 0x0, &(0x7f0000000040)) creat(&(0x7f0000000140)='./file0\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000100)={0x0, 'ifb0\x00'}, 0x18) 21:26:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x0, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) [ 427.682320][ T8989] libceph: mon1 (1)[::]:6789 socket closed (con state CONNECTING) [ 427.728505][T28101] FAT-fs (loop4): Directory bread(block 2563) failed 21:26:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ftruncate(0xffffffffffffffff, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) ioctl$sock_inet6_SIOCADDRT(r0, 0x89a0, &(0x7f00000005c0)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @ipv4={[], [], @loopback}, @remote}) write$binfmt_script(r0, &(0x7f0000000140)={'#! ', './file0', [{0x20, '/proc/capi/capi20ncci\x00'}], 0xa, "2ec5c9b3a56bf4006d2825d8a9f368c343830d131b06c007f5bd30042d2124e0a0b5c0ed585e790ef8a76632149cc8a4e5a6f398e7a1dad7b2d87c5c393bee822fa9a53e47804668fca44ac9c0cb51adbf104d3880a85e290f43311203b1e078c9a5792d4af9f2efe85cf3dc5284883f52e10923f9fbfc82610f71c62c4f9f81a436a01fa767e84c5142d255ebbe757c354e21e17a7e0b181452d18bb1d17fb3049ddb2775c17b89cb76e057b26de21ccd45dfa7d97bdf25"}, 0xda) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x20a181, 0x0) unlinkat(r1, &(0x7f0000000100)='./file0\x00', 0x200) mlock2(&(0x7f0000004000/0x400000)=nil, 0x400000, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2000000000002) [ 427.774497][T28101] FAT-fs (loop4): Directory bread(block 2564) failed 21:26:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) [ 427.878051][T28101] FAT-fs (loop4): Directory bread(block 2565) failed [ 427.925743][T28101] FAT-fs (loop4): Directory bread(block 2566) failed [ 427.932881][T28101] FAT-fs (loop4): Directory bread(block 2567) failed [ 427.976578][T28101] FAT-fs (loop4): Directory bread(block 2568) failed [ 428.010419][T28101] FAT-fs (loop4): Directory bread(block 2569) failed 21:26:13 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x0, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:13 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:13 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) [ 428.048365][T28101] FAT-fs (loop4): Directory bread(block 2570) failed [ 428.058803][T28101] FAT-fs (loop4): Directory bread(block 2571) failed [ 428.087205][T28101] FAT-fs (loop4): Directory bread(block 2572) failed 21:26:13 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) 21:26:14 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x3, 0x200) ioctl(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() syz_open_procfs(r1, &(0x7f0000000100)='setgroups\x00') ioctl(0xffffffffffffffff, 0x8936, 0x0) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x7ff) 21:26:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x0, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0", 0x8) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:14 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40a85321, &(0x7f0000000280)={{}, {}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}) 21:26:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:14 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) [ 428.700264][ T5] libceph: mon1 (1)[::]:6789 socket error on write 21:26:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x0, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:14 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0xc, 0x11}}, &(0x7f0000000140)='Q7\\$', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) 21:26:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x0, 0x8d, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:14 executing program 4: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) close(r0) 21:26:14 executing program 3: syz_mount_image$iso9660(&(0x7f00000003c0)='iso9660\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@overriderock='overriderockperm'}, {@map_off='map=off'}], [{@euid_eq={'euid'}}]}) 21:26:14 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:14 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c0, 0x40) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x4, 0x0, 0x2, 0x2}) ioctl$DRM_IOCTL_AGP_UNBIND(r1, 0x40106437, &(0x7f0000000140)={r2, 0x4}) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_NODELAY(r3, 0x84, 0x3, &(0x7f0000000000)=0x800, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00004e7000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) creat(0x0, 0x10) dup3(r4, r5, 0x0) 21:26:14 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="874388e9bb9a5a4f662e563dbc094c23340375ed71c5a84a7f0f89a371090800000000000000ae192fa66a0b14343b8901b373f7a367656a5df611c617f52584702972730983cb02209276b376518610fc61318d814de4972852e76ad3183224910becede58d3b41e7aeab8521fe9aeec3b72f2e6a742def360b651821a8730fa81f142a73cae1bdf700f351912c2cd36afdb5acec1fee7169b2080dfb88953c50b81f205625776e698924e8bbb0cb87c6473280e506fd5b511e65c548de8df221adf00b26db5823247b9e7176b9bc2ea5dbfef0734ad7d1681428bf126211cc414741afacebc83778dd18a442beaab7a264582423e91d873872df6ec576c09ac7609bf6430000a27bb1dead200cf4d64a71391cc053a5e549383d6eff328c425b945ef37f67f15ad58fdec74eb025195728490086086a9cbb7dd5787b62116332c917d9deeb9e2b62a24c123b2a29c6e354ff67c10e49088971a5a2bbfc6f1994528f3cedcfd11fa4ef2a073bdb979bd348493dcce74aa8f4bd3f", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x0, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:15 executing program 4: r0 = mq_open(&(0x7f00005a1ffb)='eth0\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) close(r0) [ 429.313912][ T25] audit: type=1800 audit(1575408375.006:54): pid=28195 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=17629 res=0 21:26:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf", 0xc) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) [ 429.553528][T28234] input: syz1 as /devices/virtual/input/input7 [ 429.658865][ T5] libceph: mon1 (1)[::]:6789 socket error on write 21:26:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:15 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x0, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:15 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0xaf02, 0x0) 21:26:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) 21:26:15 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x0, 0x4, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) 21:26:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) 21:26:15 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000040)="f4", 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd", 0xe) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:16 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x0, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = inotify_init1(0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000380)=""/189, 0xbd}], 0x1) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) close(r1) write$P9_RXATTRCREATE(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x1000000000016) 21:26:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) 21:26:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:16 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) [ 430.679354][T28346] input: syz1 as /devices/virtual/input/input10 [ 430.698761][ T5] libceph: connect (1)[d::]:6789 error -101 [ 430.704753][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:26:16 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x0, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:16 executing program 4: madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0xe) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000588ff8)) 21:26:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000280)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000040)='u', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r0}, &(0x7f0000000600)=""/243, 0x3e0, &(0x7f0000000080)={&(0x7f0000000180)={'crct10dif-generic\x00\x00\x00\x0f\x00'}}) 21:26:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x806, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0x0) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x7) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) 21:26:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x0, 0x5, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b", 0xf) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x103, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$caif_seqpacket(0x25, 0x5, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) capset(0x0, &(0x7f0000000280)={0x0, 0x0, 0x81}) r2 = socket$l2tp(0x18, 0x1, 0x1) getsockopt$XDP_STATISTICS(r0, 0x11b, 0x7, &(0x7f00000000c0), 0x0) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getpeername(r2, &(0x7f0000000040)=@tipc=@name, &(0x7f0000000100)=0x80) connect$caif(0xffffffffffffffff, 0x0, 0x0) [ 431.658732][ T5] libceph: connect (1)[d::]:6789 error -101 [ 431.666055][ T5] libceph: mon0 (1)[d::]:6789 connect error 21:26:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x0, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:17 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000009c0)) [ 431.807319][T28503] input: syz1 as /devices/virtual/input/input12 21:26:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}}, {{0xa, 0x0, 0x0, @mcast2}}}, 0x108) close(r0) 21:26:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:17 executing program 2: syz_mount_image$msdos(&(0x7f0000000500)='msdos\x00', &(0x7f0000000340)='./file0\x00', 0xe800, 0x1, &(0x7f0000000540)=[{&(0x7f00000000c0)="eb63dfb11f6234e6fbcf9001b73c906d6b66732e6611e9c5497fd707b2e456046b5c619911ad0c673f48ace91e1049dd840df173740002040000000000080000", 0x40}], 0x18, 0x0) r0 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x0) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000880)=""/207, 0xcf, 0x12100, &(0x7f0000000240)={0x2, 0x4e22}, 0x10) sendto$unix(r0, &(0x7f00000003c0), 0x0, 0x40881, 0x0, 0x0) fchdir(r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000f40)='/dev/ptmx\x00', 0x10905, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000001100)='/dev/uinput\x00', 0x40004, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x81, 0x3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff]}, 0x45c) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000380)={@dev, @broadcast, 0x0}, &(0x7f0000000ec0)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000040)={'team0\x00', r4}) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000017740)={0xc8, r3, 0x1, 0x0, 0x0, {}, [{{0x8, 0x1, r5}, {0xac, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}]}, 0xc8}}, 0x0) ioctl$UI_DEV_SETUP(r1, 0x5501, &(0x7f0000000300)={{0x0, 0x7f}, 'syz0\x00'}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') setsockopt$IP_VS_SO_SET_EDIT(r7, 0x0, 0x483, &(0x7f00000003c0)={0x3c, @remote, 0x4e24, 0x0, 'rr\x00', 0x2, 0x1, 0x39}, 0x2c) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000002c0)={'teql0\x00', 0x9}) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000140)) mount(&(0x7f0000000d40)=ANY=[@ANYBLOB="eb211b0ef5df1b0a7eadeab0c375a3a40e25becc9ec416499d5c208a803e9c8e8bf7ff0091212e4d9e4c25acf6de1e782195d377a170c16d7d850000cf75f43ce3f1d70b9d7baa8f2467e8609efe14e3ff387733d1193d4cb8fa7d482f01e622d3623ab5cfe1f830ad600a7510b690426141f8d92d0d51745903c515374b1f26454558028ff8c07028d9bb64a78447e7b4cab96e224666e5c8a634a900b3ba095d95ccc71f2ef0ca27d5f7004971bcc7bb816deb5f4715b884559273470e037a30f80f4e18cc10507afa3c2ee8172c000000000000"], 0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000f00)=ANY=[@ANYBLOB="3897c61e2344b35ce4b0e8eb675766d6275488bb0fb34f52ffa1089aff3a2dda6d16dcf00100000000000000016b7b1039cfd93e445671550a8131d1"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000001140)=ANY=[@ANYBLOB="6e76826cec4b14e3e1ba40ade347da9043642d201bea3e06ad9460ae68add5babb300e80cffb9d2722ec15c095e189efa7b86cc8af00983817a30f1141cf2eed277caed5251ec0e73df9048dd0b27577f670ec108394fe3400cd4b113e95d26431fcdeee9f0f76a06325e510b6d410732211c73965375e75ec82c0724c3fd14a553573f5f4c86a6658e16668ee9b827b4c2c0a2206277dcc42249dcc708a6ac21059b2b46095dde811799262fd0a78ffdc29275bf20901e33498cb0d99c831272038d64eb2d4a0d82e191b80065564080491d61817683e9c6a9ec2f58a32b59e9e663771363247f43631ec6f4614545e33fdb477babb336793abe5c57800"/269], 0x0, 0x0, 0x80010, 0x0) mount(&(0x7f0000001280)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000000e40)='./file0\x00', &(0x7f0000000100)='./file0\x00') preadv(r7, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) 21:26:17 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x0, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:17 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x30}], 0x1}}], 0x1, 0x0, 0x0) 21:26:17 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:17 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000680)) 21:26:17 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$alg(r1, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x0, 0x1f, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:18 executing program 5: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:18 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x0, 0x0) gettid() socket$inet(0x2, 0x6, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f00000002c0)=[@window={0x3, 0x0, 0x6}, @window={0x3, 0x0, 0x1e8000}, @window={0x3, 0x5, 0x5}], 0x3) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f0000000300)) readv(r1, &(0x7f0000000040)=[{&(0x7f00004d2000)=""/4096, 0x1000}], 0x1) [ 432.419579][T28744] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 21:26:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x0, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:18 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:18 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0x40086607, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x13e60}) [ 432.672613][T28767] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 432.699896][ T8989] libceph: connect (1)[d::]:6789 error -101 21:26:18 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) [ 432.723420][ T8989] libceph: mon0 (1)[d::]:6789 connect error 21:26:18 executing program 5: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(r1, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:18 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f0000000680)) 21:26:18 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x0, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:18 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000340)=ANY=[], 0xff0e) close(r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f00000000c0)=0x800000100000001, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x0, 0x0, @ipv4}}, 0x0, 0x40, 0x0, "5c7d866ff43751f8873fcb0dab400c418118817f88dd32c8a5bd1f96947a61b9c9627f989c7f422dd7658bd36505c1c3e348680b100694e23cb170b6156fe10ef3d50b45685df5fda61c86a7608eaf0a"}, 0xd8) connect$inet6(r2, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x355) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000280)=@gcm_256={{0x304}, "cddf018312d6d75b", "c0f711a359a5b7215aeb47f891eb668a642577d10642dcf00350e63e6b940232", "9b6795d9", "36a83ebf3f0d54f0"}, 0x38) splice(r0, 0x0, r1, 0x0, 0x100000000, 0x0) 21:26:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(0xffffffffffffffff, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in=@loopback, @in6=@mcast2}}, {{}, 0x0, @in=@initdev}}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, 0x0, 0x0) 21:26:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="12"], 0x1) perf_event_open(&(0x7f00000024c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000300)=[{{0x0, 0x1b3, &(0x7f0000000280)=[{&(0x7f0000000140)=""/47}, {&(0x7f0000000180)=""/173}, {&(0x7f0000000240)=""/3}, {&(0x7f00000003c0)=""/236}, {&(0x7f00000004c0)=""/158}], 0x0, &(0x7f0000000080)=""/62, 0x3e}}], 0x20a, 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000009c0)) 21:26:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x6, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000002c0)={0x0, 0x7, 0x16, "18a1f76586a805252de9f876abf8b3447525e4f6d080651daa4ecfddc2acf2318e965923980b340615765f11f9347d9793e005c47a4918283a48b324", 0x24, "713433b5522113f30cd7f08ba24b4d18be512c59d339208b9773594962e311d1d4734fc527ae776a35af61a00694df071c7f0dad9a543fe614e725f8"}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$FS_IOC_SETFLAGS(r1, 0x40086607, &(0x7f0000000000)) [ 433.223294][ T560] kasan: CONFIG_KASAN_INLINE enabled [ 433.228910][ T560] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 433.237025][ T560] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 433.243973][ T560] CPU: 1 PID: 560 Comm: kworker/u4:10 Not tainted 5.4.0-syzkaller #0 [ 433.252198][ T560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.262330][ T560] Workqueue: pencrypt_parallel padata_parallel_worker [ 433.269199][ T560] RIP: 0010:gcmaes_crypt_by_sg.constprop.0+0x1035/0x1aa0 [ 433.276269][ T560] Code: e8 b0 02 52 02 48 89 84 24 a8 00 00 00 48 83 c0 08 48 89 c2 48 89 84 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 30 09 00 00 48 8b 84 24 a8 00 [ 433.285191][T28894] kobject: 'loop4' (0000000090d81678): kobject_uevent_env [ 433.296308][ T560] RSP: 0000:ffffc90002cb7750 EFLAGS: 00010202 [ 433.296321][ T560] RAX: dffffc0000000000 RBX: 0000000000003006 RCX: ffffffff838ba9f9 [ 433.296330][ T560] RDX: 0000000000000001 RSI: ffffffff838baa4b RDI: 0000000000000007 [ 433.296338][ T560] RBP: ffffc90002cb7b20 R08: ffff8880a8332000 R09: 0000000000000005 [ 433.296344][ T560] R10: 0000000000000000 R11: 0000000000000ffb R12: 0000000000003006 [ 433.296351][ T560] R13: 0000000000000000 R14: ffff888053c33300 R15: 0000000000003006 [ 433.296361][ T560] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 433.296368][ T560] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 433.296375][ T560] CR2: 00007fa6ece55330 CR3: 0000000094c3d000 CR4: 00000000001406e0 [ 433.296385][ T560] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 433.296392][ T560] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 433.296396][ T560] Call Trace: [ 433.296428][ T560] ? common_rfc4106_set_key+0x180/0x180 [ 433.296494][ T560] ? unwind_next_frame+0x3b/0x50 [ 433.296525][ T560] ? arch_stack_walk+0x81/0xf0 [ 433.309212][T28894] kobject: 'loop4' (0000000090d81678): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 433.309753][ T560] ? ret_from_fork+0x24/0x30 [ 433.351400][T28894] REISERFS warning (device loop4): sh-2021 reiserfs_fill_super: can not find reiserfs on loop4 [ 433.360237][ T560] ? __kasan_check_read+0x11/0x20 [ 433.360259][ T560] ? __kasan_check_read+0x11/0x20 [ 433.360305][ T560] ? mark_lock+0xc2/0x1220 [ 433.360374][ T560] ? debug_smp_processor_id+0x33/0x18a [ 433.360453][ T560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.462697][ T560] ? __kasan_check_read+0x11/0x20 [ 433.467729][ T560] ? mark_lock+0xc2/0x1220 21:26:19 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmp(0x0, 0x6, 0x0) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f00000002c0)={0x0, 0x7, 0x16, "18a1f76586a805252de9f876abf8b3447525e4f6d080651daa4ecfddc2acf2318e965923980b340615765f11f9347d9793e005c47a4918283a48b324", 0x24, "713433b5522113f30cd7f08ba24b4d18be512c59d339208b9773594962e311d1d4734fc527ae776a35af61a00694df071c7f0dad9a543fe614e725f8"}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) prctl$PR_GET_FP_MODE(0x2e) ioctl$FS_IOC_SETFLAGS(r1, 0x40086607, &(0x7f0000000000)) 21:26:19 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x0, 0xfffffffffffffffc, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:19 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vfio/vfio\x00', 0x20800, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000400)={@dev={0xac, 0x14, 0x14, 0x1e}, @loopback}, 0x8) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x511, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf026, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) tee(r0, r1, 0x80000000, 0x9) getsockname$tipc(r0, &(0x7f0000001a40), &(0x7f0000001a80)=0x10) recvmsg(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000019c0)=[{&(0x7f0000000640)=""/183, 0xb7}, {&(0x7f0000000700)=""/161, 0xa1}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/98, 0x62}, {&(0x7f0000001840)=""/145, 0x91}, {&(0x7f0000001900)=""/140, 0x8c}, {&(0x7f0000000280)=""/51, 0x33}], 0x7}, 0x0) r3 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x208000, 0x0) r4 = syz_init_net_socket$llc(0x1a, 0x801, 0x0) r5 = syz_open_dev$admmidi(&(0x7f00000005c0)='/dev/admmidi#\x00', 0x80000000, 0x2) setsockopt$inet6_mtu(r5, 0x29, 0x17, &(0x7f0000001b00)=0x5, 0x4) sendto$llc(r4, &(0x7f0000001d00)="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", 0x17b, 0x40, 0x0, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20ncci\x00', 0x3ffe, 0x0) perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x5, 0x5, 0x4000000000000000, 0x80da, 0x0, 0x100000001, 0x70240, 0x2, 0x5, 0x9, 0x7, 0xffffffff, 0x80000001, 0x5, 0x1, 0x7fff, 0x2, 0x7, 0x8, 0x1, 0x3, 0x132, 0x5, 0x1, 0x81, 0x705, 0x2, 0x8d, 0x4, 0x5, 0x1f, 0x0, 0x800, 0x6f84c283, 0x3ff, 0x6, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000480), 0xa}, 0x400, 0x7f, 0x0, 0x8, 0x1, 0x5, 0x5}, 0xffffffffffffffff, 0x4, r5, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000140)) read$eventfd(r6, &(0x7f0000000040), 0x8) ioctl$EXT4_IOC_MOVE_EXT(r5, 0xc028660f, &(0x7f00000002c0)={0x0, r2, 0x0, 0xe9d, 0x20, 0x9}) socket$inet6(0xa, 0x6, 0x401) connect$llc(r4, &(0x7f0000000380)={0x1a, 0x0, 0x0, 0x5, 0x0, 0x0, @dev={[], 0x19}}, 0x10) sendmmsg(r4, &(0x7f0000001380), 0x40003ad, 0x2000000) 21:26:19 executing program 3: r0 = memfd_create(&(0x7f0000000300)='\x00\x00\x00\x00\x10W8`\xb4\x8e\x03\xab\v\x81\x10@\x8d\x89=\xacT\x03\x188o\xc7\xe2\xd7@\xbd1\xe7W\xe1\xae.=\x91\x9d\x03o.=*\x17\xab\xcaB\x87\xaf\xd2@\xc0\xf4\xb2Mb:\xf9\xf1c\x12uZqeK\xf91\xe5pA\x91T\x1d\x13\xf5v-\xad\xc2u\xe1\x12\xa8\x03\v\xf0b\x1f\xa1a\xbctI#\xb2+!\xb6\xab\xab\xbc\x86\xcd\xc1\xe0\xa0V\x9f\xbd14^yx\xc3\xc7\x17P\x89\xf3o\xc1 \x06\xe0W^\xf9i\xc4^\x8f\xb8T\xb3o\x9a3\x19\xfb0\xc0\xa7o\xe0\xf7\xa3\xcc\xb8\x9b|{\xbe\xde\r\xe1\x10\xc4\r.\xd3I\xc6\x87\x12/\xa0\x98\x89+\x87\xa1l\xc3T\x0f\xdf\x9c\xb2\x89\xa4P\x9a\xad\xdc\xb1\xe3\x89\xbf\"9\xdc\xd6\xc8\x86X}\xce\xfe\xa2 I5r\x1c\x83\xba\xcd\x0f\x17\x7f_\"\x94\a\xce\xd0b:\xc9\xe9\x8a\xbb\x96|\xf5\xfd[\x86~\xb0c\xf3\xba\x1e\x0e\x04j\xeb\r\xa01-\x17\x1fJ\xa74\xac\xc7\x12\xe6\xf7\':\x83\"\'i\x8f\\%\xfc\x87\xf2^\x96\x1c?\xdc\x9dN\x0f*\x1e\xc6\xa0\xefFf F\xe9\xffT\xf2%\xe0{\x83\x1dk\xc4\x01\x04?6\aH\xcd\xbb\x1eu\r\x1d=\xe8\xf0\xb8\xbd\xdb\x946)3\xc2/i\xbcq\xc1\xd6\x9e\xdcLI\xf1\x91\x92_H\xb6\xc4\x1c\x1f\xd5\xde\xeb\xe6\x98\x1e\xa2\xb6S\xf1}\x8e\xad\x11\xda\x91\xfd\xc4\xf3wr,\xe63(R\xd3\x10\x1c\x061\x05\x19\x1eX[\xa7\xcb\xd3\xfe5*>\x18\x89\xc8Obe\x00\x00\x00\x00\xff.p', 0x0) fsetxattr(0xffffffffffffffff, &(0x7f0000000140)=@known='security.capability\x00', &(0x7f0000000200)='vmnet0selinuxuserGPL,(ppp0bdev&*\\!{\x00', 0x24, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x7812b8c2, 0xffffffff, 0x3) [ 433.472153][ T560] ? __kasan_check_read+0x11/0x20 [ 433.477386][ T560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 433.483635][ T560] ? debug_smp_processor_id+0x33/0x18a [ 433.489157][ T560] ? perf_trace_lock+0xeb/0x4c0 [ 433.494010][ T560] ? __kasan_check_read+0x11/0x20 [ 433.499130][ T560] generic_gcmaes_encrypt+0x10d/0x160 [ 433.505492][ T560] ? helper_rfc4106_encrypt+0x390/0x390 [ 433.511044][ T560] ? padata_parallel_worker+0x1a3/0x470 [ 433.516677][ T560] crypto_aead_encrypt+0xaf/0xf0 [ 433.521642][ T560] simd_aead_encrypt+0x1a6/0x2b0 [ 433.526654][ T560] crypto_aead_encrypt+0xaf/0xf0 [ 433.531639][ T560] pcrypt_aead_enc+0x19/0x80 [ 433.536212][ T560] padata_parallel_worker+0x28f/0x470 [ 433.541623][ T560] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 433.547759][ T560] ? invoke_padata_reorder+0x40/0x40 [ 433.553025][ T560] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 433.558551][ T560] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 433.564543][ T560] ? trace_hardirqs_on+0x67/0x240 [ 433.569582][ T560] process_one_work+0x9af/0x1740 [ 433.574535][ T560] ? pwq_dec_nr_in_flight+0x320/0x320 [ 433.579890][ T560] ? lock_acquire+0x190/0x410 [ 433.584552][ T560] worker_thread+0x98/0xe40 [ 433.589056][ T560] kthread+0x361/0x430 [ 433.593119][ T560] ? process_one_work+0x1740/0x1740 [ 433.598313][ T560] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 433.604017][ T560] ret_from_fork+0x24/0x30 [ 433.608414][ T560] Modules linked in: [ 433.612361][ T560] ------------[ cut here ]------------ [ 433.617819][ T560] WARNING: CPU: 1 PID: 560 at kernel/locking/mutex.c:1419 mutex_trylock+0x279/0x2f0 [ 433.627160][ T560] Kernel panic - not syncing: panic_on_warn set ... [ 433.633779][ T560] ------------[ cut here ]------------ [ 433.639221][ T560] WARNING: CPU: 1 PID: 560 at kernel/locking/mutex.c:1419 mutex_trylock+0x279/0x2f0 [ 433.648557][ T560] Modules linked in: [ 433.652434][ T560] CPU: 1 PID: 560 Comm: kworker/u4:10 Not tainted 5.4.0-syzkaller #0 [ 433.660469][ T560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 433.670598][ T560] Workqueue: pencrypt_parallel padata_parallel_worker [ 433.677342][ T560] RIP: 0010:mutex_trylock+0x279/0x2f0 [ 433.682691][ T560] Code: c9 41 b8 01 00 00 00 31 c9 ba 01 00 00 00 31 f6 e8 ac 32 99 f9 58 48 8d 65 d8 b8 01 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b e9 0c fe ff ff 48 c7 c7 e0 e4 41 8b 48 89 4d d0 e8 e0 be f0 [ 433.702713][ T560] RSP: 0000:ffffc90002cb7008 EFLAGS: 00010006 [ 433.708758][ T560] RAX: 0000000000000203 RBX: 1ffff92000596e09 RCX: 0000000000000004 [ 433.716708][ T560] RDX: 0000000000000000 RSI: ffffffff816be955 RDI: ffffffff897c27a0 [ 433.724658][ T560] RBP: ffffc90002cb7038 R08: 0000000000000002 R09: fffffbfff12f3855 [ 433.732607][ T560] R10: fffffbfff12f3854 R11: ffffffff8979c2a3 R12: ffffffff8b41e4e0 [ 433.740559][ T560] R13: 0000000000000000 R14: ffffffff87c1ab00 R15: ffffffff897c27a0 [ 433.748515][ T560] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 433.757429][ T560] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 433.764008][ T560] CR2: 00007fa6ece55330 CR3: 0000000094c3d000 CR4: 00000000001406e0 [ 433.771972][ T560] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 433.779928][ T560] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 433.787879][ T560] Call Trace: [ 433.791159][ T560] ? mutex_trylock+0x190/0x2f0 [ 433.795908][ T560] __crash_kexec+0x91/0x200 [ 433.800406][ T560] ? kexec_crash_loaded+0x20/0x20 [ 433.805414][ T560] ? trace_hardirqs_off+0x62/0x240 [ 433.810509][ T560] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 433.816347][ T560] ? __printk_safe_flush+0x31e/0x3a0 [ 433.821616][ T560] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 433.827349][ T560] ? find_next_bit+0x107/0x130 [ 433.832938][ T560] ? cpumask_next+0x41/0x50 [ 433.837423][ T560] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 433.843121][ T560] ? printk_safe_flush+0xf2/0x140 [ 433.848126][ T560] ? mutex_trylock+0x190/0x2f0 [ 433.853509][ T560] panic+0x308/0x75c [ 433.857388][ T560] ? add_taint.cold+0x16/0x16 [ 433.862049][ T560] ? printk+0xba/0xed [ 433.866015][ T560] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 433.873274][ T560] ? __warn.cold+0x14/0x3e [ 433.877671][ T560] ? __warn+0xd9/0x1cf [ 433.881721][ T560] ? mutex_trylock+0x279/0x2f0 [ 433.886460][ T560] __warn.cold+0x2f/0x3e [ 433.890687][ T560] ? report_bug.cold+0x63/0xb2 [ 433.895426][ T560] ? mutex_trylock+0x279/0x2f0 [ 433.900171][ T560] report_bug+0x289/0x300 [ 433.904538][ T560] do_error_trap+0x11b/0x200 [ 433.909197][ T560] do_invalid_op+0x37/0x50 [ 433.913600][ T560] ? mutex_trylock+0x279/0x2f0 [ 433.918342][ T560] invalid_op+0x23/0x30 [ 433.922476][ T560] RIP: 0010:mutex_trylock+0x279/0x2f0 [ 433.927827][ T560] Code: c9 41 b8 01 00 00 00 31 c9 ba 01 00 00 00 31 f6 e8 ac 32 99 f9 58 48 8d 65 d8 b8 01 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b e9 0c fe ff ff 48 c7 c7 e0 e4 41 8b 48 89 4d d0 e8 e0 be f0 [ 433.947419][ T560] RSP: 0000:ffffc90002cb7440 EFLAGS: 00010006 [ 433.953460][ T560] RAX: 0000000000000202 RBX: 1ffff92000596e90 RCX: 0000000000000004 [ 433.961436][ T560] RDX: 0000000000000000 RSI: ffffffff816be955 RDI: ffffffff897c27a0 [ 433.970015][ T560] RBP: ffffc90002cb7470 R08: 0000000000000001 R09: fffffbfff12f3855 [ 433.977963][ T560] R10: fffffbfff12f3854 R11: ffffffff8979c2a3 R12: ffffffff8b41e4e0 [ 433.985912][ T560] R13: ffffc90002cb76a8 R14: ffffffff89761640 R15: ffffffff897c27a0 [ 433.994915][ T560] ? __crash_kexec+0x85/0x200 [ 433.999576][ T560] __crash_kexec+0x91/0x200 [ 434.004061][ T560] ? kexec_crash_loaded+0x20/0x20 [ 434.009067][ T560] ? trace_hardirqs_off+0x62/0x240 [ 434.014159][ T560] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 434.019943][ T560] ? __printk_safe_flush+0x31e/0x3a0 [ 434.025213][ T560] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 434.030910][ T560] ? find_next_bit+0x107/0x130 [ 434.035653][ T560] ? cpumask_next+0x41/0x50 [ 434.040136][ T560] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.045854][ T560] ? printk_safe_flush+0xf2/0x140 [ 434.051468][ T560] crash_kexec+0x78/0xe0 [ 434.055715][ T560] oops_end+0xaa/0xf0 [ 434.059685][ T560] die+0x3e/0x48 [ 434.063220][ T560] do_general_protection+0x15d/0x370 [ 434.068624][ T560] general_protection+0x2d/0x40 [ 434.073472][ T560] RIP: 0010:gcmaes_crypt_by_sg.constprop.0+0x1035/0x1aa0 [ 434.080490][ T560] Code: e8 b0 02 52 02 48 89 84 24 a8 00 00 00 48 83 c0 08 48 89 c2 48 89 84 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 30 09 00 00 48 8b 84 24 a8 00 [ 434.100163][ T560] RSP: 0000:ffffc90002cb7750 EFLAGS: 00010202 [ 434.106208][ T560] RAX: dffffc0000000000 RBX: 0000000000003006 RCX: ffffffff838ba9f9 [ 434.114157][ T560] RDX: 0000000000000001 RSI: ffffffff838baa4b RDI: 0000000000000007 [ 434.122106][ T560] RBP: ffffc90002cb7b20 R08: ffff8880a8332000 R09: 0000000000000005 [ 434.130143][ T560] R10: 0000000000000000 R11: 0000000000000ffb R12: 0000000000003006 [ 434.138093][ T560] R13: 0000000000000000 R14: ffff888053c33300 R15: 0000000000003006 [ 434.146058][ T560] ? sg_next+0x39/0xc0 [ 434.150131][ T560] ? sg_next+0x8b/0xc0 [ 434.154202][ T560] ? common_rfc4106_set_key+0x180/0x180 [ 434.159728][ T560] ? unwind_next_frame+0x3b/0x50 [ 434.164646][ T560] ? arch_stack_walk+0x81/0xf0 [ 434.169924][ T560] ? ret_from_fork+0x24/0x30 [ 434.174523][ T560] ? __kasan_check_read+0x11/0x20 [ 434.180225][ T560] ? __kasan_check_read+0x11/0x20 [ 434.185228][ T560] ? mark_lock+0xc2/0x1220 [ 434.189712][ T560] ? debug_smp_processor_id+0x33/0x18a [ 434.195152][ T560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.201372][ T560] ? __kasan_check_read+0x11/0x20 [ 434.206375][ T560] ? mark_lock+0xc2/0x1220 [ 434.210767][ T560] ? __kasan_check_read+0x11/0x20 [ 434.215773][ T560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.221991][ T560] ? debug_smp_processor_id+0x33/0x18a [ 434.227528][ T560] ? perf_trace_lock+0xeb/0x4c0 [ 434.232443][ T560] ? __kasan_check_read+0x11/0x20 [ 434.237462][ T560] generic_gcmaes_encrypt+0x10d/0x160 [ 434.242815][ T560] ? helper_rfc4106_encrypt+0x390/0x390 [ 434.248340][ T560] ? padata_parallel_worker+0x1a3/0x470 [ 434.253866][ T560] crypto_aead_encrypt+0xaf/0xf0 [ 434.258783][ T560] simd_aead_encrypt+0x1a6/0x2b0 [ 434.263822][ T560] crypto_aead_encrypt+0xaf/0xf0 [ 434.268749][ T560] pcrypt_aead_enc+0x19/0x80 [ 434.273329][ T560] padata_parallel_worker+0x28f/0x470 [ 434.278685][ T560] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 434.284822][ T560] ? invoke_padata_reorder+0x40/0x40 [ 434.290087][ T560] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 434.295611][ T560] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 434.301592][ T560] ? trace_hardirqs_on+0x67/0x240 [ 434.306606][ T560] process_one_work+0x9af/0x1740 [ 434.311524][ T560] ? pwq_dec_nr_in_flight+0x320/0x320 [ 434.316874][ T560] ? lock_acquire+0x190/0x410 [ 434.321536][ T560] worker_thread+0x98/0xe40 [ 434.326020][ T560] kthread+0x361/0x430 [ 434.330068][ T560] ? process_one_work+0x1740/0x1740 [ 434.335336][ T560] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 434.341036][ T560] ret_from_fork+0x24/0x30 [ 434.345432][ T560] irq event stamp: 684404 [ 434.349741][ T560] hardirqs last enabled at (684404): [] console_unlock+0x7b3/0xf00 [ 434.359262][ T560] hardirqs last disabled at (684403): [] console_unlock+0x1b4/0xf00 [ 434.368886][ T560] softirqs last enabled at (684066): [] batadv_nc_purge_paths+0x265/0x370 [ 434.379013][ T560] softirqs last disabled at (684384): [] padata_parallel_worker+0x0/0x470 [ 434.389044][ T560] ---[ end trace 1629d8c5a01b7c04 ]--- [ 434.394545][ T560] ------------[ cut here ]------------ [ 434.399987][ T560] WARNING: CPU: 1 PID: 560 at kernel/locking/mutex.c:737 mutex_unlock+0x1d/0x30 [ 434.408975][ T560] Modules linked in: [ 434.412897][ T560] CPU: 1 PID: 560 Comm: kworker/u4:10 Tainted: G W 5.4.0-syzkaller #0 [ 434.422428][ T560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.432828][ T560] Workqueue: pencrypt_parallel padata_parallel_worker [ 434.439573][ T560] RIP: 0010:mutex_unlock+0x1d/0x30 [ 434.444663][ T560] Code: 4c 89 ff e8 35 ca f0 f9 e9 8c fb ff ff 55 65 8b 05 b0 7d 40 78 a9 00 ff 1f 00 48 89 e5 75 0b 48 8b 75 08 e8 45 f9 ff ff 5d c3 <0f> 0b 48 8b 75 08 e8 38 f9 ff ff 5d c3 66 0f 1f 44 00 00 48 b8 00 [ 434.465200][ T560] RSP: 0000:ffffc90002cb7038 EFLAGS: 00010006 [ 434.471254][ T560] RAX: 0000000000000203 RBX: 1ffff92000596e09 RCX: ffffffff816be96d [ 434.479204][ T560] RDX: 0000000000000000 RSI: ffffffff816be9cf RDI: ffffffff897c27a0 [ 434.487155][ T560] RBP: ffffc90002cb7038 R08: ffff8880a8332000 R09: 0000000000000000 [ 434.495718][ T560] R10: fffffbfff14b0ab0 R11: ffff8880a8332000 R12: 0000000000000001 [ 434.504201][ T560] R13: 0000000000000000 R14: ffffffff87c1ab00 R15: 000000000000058b [ 434.512164][ T560] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 434.521070][ T560] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 434.527634][ T560] CR2: 00007fa6ece55330 CR3: 0000000094c3d000 CR4: 00000000001406e0 [ 434.535584][ T560] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 434.543532][ T560] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 434.551498][ T560] Call Trace: [ 434.554780][ T560] __crash_kexec+0x10b/0x200 [ 434.559351][ T560] ? kexec_crash_loaded+0x20/0x20 [ 434.564354][ T560] ? trace_hardirqs_off+0x62/0x240 [ 434.569446][ T560] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 434.575242][ T560] ? __printk_safe_flush+0x31e/0x3a0 [ 434.580505][ T560] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 434.586205][ T560] ? find_next_bit+0x107/0x130 [ 434.591224][ T560] ? cpumask_next+0x41/0x50 [ 434.596230][ T560] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.602014][ T560] ? printk_safe_flush+0xf2/0x140 [ 434.607016][ T560] ? mutex_trylock+0x190/0x2f0 [ 434.611773][ T560] panic+0x308/0x75c [ 434.615646][ T560] ? add_taint.cold+0x16/0x16 [ 434.620312][ T560] ? printk+0xba/0xed [ 434.624275][ T560] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 434.629716][ T560] ? __warn.cold+0x14/0x3e [ 434.634109][ T560] ? __warn+0xd9/0x1cf [ 434.638157][ T560] ? mutex_trylock+0x279/0x2f0 [ 434.642906][ T560] __warn.cold+0x2f/0x3e [ 434.647126][ T560] ? report_bug.cold+0x63/0xb2 [ 434.651868][ T560] ? mutex_trylock+0x279/0x2f0 [ 434.656608][ T560] report_bug+0x289/0x300 [ 434.660926][ T560] do_error_trap+0x11b/0x200 [ 434.665495][ T560] do_invalid_op+0x37/0x50 [ 434.669888][ T560] ? mutex_trylock+0x279/0x2f0 [ 434.674654][ T560] invalid_op+0x23/0x30 [ 434.678789][ T560] RIP: 0010:mutex_trylock+0x279/0x2f0 [ 434.684139][ T560] Code: c9 41 b8 01 00 00 00 31 c9 ba 01 00 00 00 31 f6 e8 ac 32 99 f9 58 48 8d 65 d8 b8 01 00 00 00 5b 41 5c 41 5d 41 5e 41 5f 5d c3 <0f> 0b e9 0c fe ff ff 48 c7 c7 e0 e4 41 8b 48 89 4d d0 e8 e0 be f0 [ 434.703720][ T560] RSP: 0000:ffffc90002cb7440 EFLAGS: 00010006 [ 434.709764][ T560] RAX: 0000000000000202 RBX: 1ffff92000596e90 RCX: 0000000000000004 [ 434.717730][ T560] RDX: 0000000000000000 RSI: ffffffff816be955 RDI: ffffffff897c27a0 [ 434.725694][ T560] RBP: ffffc90002cb7470 R08: 0000000000000001 R09: fffffbfff12f3855 [ 434.733645][ T560] R10: fffffbfff12f3854 R11: ffffffff8979c2a3 R12: ffffffff8b41e4e0 [ 434.741594][ T560] R13: ffffc90002cb76a8 R14: ffffffff89761640 R15: ffffffff897c27a0 [ 434.749554][ T560] ? __crash_kexec+0x85/0x200 [ 434.754225][ T560] __crash_kexec+0x91/0x200 [ 434.758794][ T560] ? kexec_crash_loaded+0x20/0x20 [ 434.763798][ T560] ? trace_hardirqs_off+0x62/0x240 [ 434.768890][ T560] ? _raw_spin_unlock_irqrestore+0x9f/0xe0 [ 434.774698][ T560] ? __printk_safe_flush+0x31e/0x3a0 [ 434.779961][ T560] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 434.785658][ T560] ? find_next_bit+0x107/0x130 [ 434.790401][ T560] ? cpumask_next+0x41/0x50 [ 434.794880][ T560] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 434.800600][ T560] ? printk_safe_flush+0xf2/0x140 [ 434.805608][ T560] crash_kexec+0x78/0xe0 [ 434.809838][ T560] oops_end+0xaa/0xf0 [ 434.813797][ T560] die+0x3e/0x48 [ 434.817342][ T560] do_general_protection+0x15d/0x370 [ 434.822620][ T560] general_protection+0x2d/0x40 [ 434.827465][ T560] RIP: 0010:gcmaes_crypt_by_sg.constprop.0+0x1035/0x1aa0 [ 434.834502][ T560] Code: e8 b0 02 52 02 48 89 84 24 a8 00 00 00 48 83 c0 08 48 89 c2 48 89 84 24 90 00 00 00 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 03 0f 8e 30 09 00 00 48 8b 84 24 a8 00 [ 434.855499][ T560] RSP: 0000:ffffc90002cb7750 EFLAGS: 00010202 [ 434.861553][ T560] RAX: dffffc0000000000 RBX: 0000000000003006 RCX: ffffffff838ba9f9 [ 434.869508][ T560] RDX: 0000000000000001 RSI: ffffffff838baa4b RDI: 0000000000000007 [ 434.877462][ T560] RBP: ffffc90002cb7b20 R08: ffff8880a8332000 R09: 0000000000000005 [ 434.885517][ T560] R10: 0000000000000000 R11: 0000000000000ffb R12: 0000000000003006 [ 434.893472][ T560] R13: 0000000000000000 R14: ffff888053c33300 R15: 0000000000003006 [ 434.901463][ T560] ? sg_next+0x39/0xc0 [ 434.905520][ T560] ? sg_next+0x8b/0xc0 [ 434.909590][ T560] ? common_rfc4106_set_key+0x180/0x180 [ 434.915298][ T560] ? unwind_next_frame+0x3b/0x50 [ 434.920313][ T560] ? arch_stack_walk+0x81/0xf0 [ 434.925065][ T560] ? ret_from_fork+0x24/0x30 [ 434.929729][ T560] ? __kasan_check_read+0x11/0x20 [ 434.934762][ T560] ? __kasan_check_read+0x11/0x20 [ 434.939781][ T560] ? mark_lock+0xc2/0x1220 [ 434.944179][ T560] ? debug_smp_processor_id+0x33/0x18a [ 434.949621][ T560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.955927][ T560] ? __kasan_check_read+0x11/0x20 [ 434.960929][ T560] ? mark_lock+0xc2/0x1220 [ 434.965325][ T560] ? __kasan_check_read+0x11/0x20 [ 434.970329][ T560] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 434.976561][ T560] ? debug_smp_processor_id+0x33/0x18a [ 434.982012][ T560] ? perf_trace_lock+0xeb/0x4c0 [ 434.986841][ T560] ? __kasan_check_read+0x11/0x20 [ 434.991938][ T560] generic_gcmaes_encrypt+0x10d/0x160 [ 434.997380][ T560] ? helper_rfc4106_encrypt+0x390/0x390 [ 435.002914][ T560] ? padata_parallel_worker+0x1a3/0x470 [ 435.008456][ T560] crypto_aead_encrypt+0xaf/0xf0 [ 435.013376][ T560] simd_aead_encrypt+0x1a6/0x2b0 [ 435.018306][ T560] crypto_aead_encrypt+0xaf/0xf0 [ 435.023226][ T560] pcrypt_aead_enc+0x19/0x80 [ 435.027795][ T560] padata_parallel_worker+0x28f/0x470 [ 435.033148][ T560] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 435.039281][ T560] ? invoke_padata_reorder+0x40/0x40 [ 435.044544][ T560] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 435.050072][ T560] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 435.056303][ T560] ? trace_hardirqs_on+0x67/0x240 [ 435.061310][ T560] process_one_work+0x9af/0x1740 [ 435.066232][ T560] ? pwq_dec_nr_in_flight+0x320/0x320 [ 435.071581][ T560] ? lock_acquire+0x190/0x410 [ 435.076242][ T560] worker_thread+0x98/0xe40 [ 435.080734][ T560] kthread+0x361/0x430 [ 435.084796][ T560] ? process_one_work+0x1740/0x1740 [ 435.089972][ T560] ? kthread_mod_delayed_work+0x1f0/0x1f0 [ 435.095674][ T560] ret_from_fork+0x24/0x30 [ 435.100076][ T560] irq event stamp: 684404 [ 435.104389][ T560] hardirqs last enabled at (684404): [] console_unlock+0x7b3/0xf00 [ 435.113908][ T560] hardirqs last disabled at (684403): [] console_unlock+0x1b4/0xf00 [ 435.123434][ T560] softirqs last enabled at (684066): [] batadv_nc_purge_paths+0x265/0x370 [ 435.133580][ T560] softirqs last disabled at (684384): [] padata_parallel_worker+0x0/0x470 [ 435.143642][ T560] ---[ end trace 1629d8c5a01b7c05 ]--- [ 435.150643][ T560] Kernel Offset: disabled [ 435.154994][ T560] Rebooting in 86400 seconds..