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"}, {0xc8, 0x11f, 0xfffffffffffffffc, "e507e0f4456d8a2726fa8051b11553bbe7977ef526a10abe1158fbc142768e5a8674bbb90b717c9341da826d2d0470aa148642e4ea510b1bab4dfea7eb1f7de90b76c7e8a58b051f1235ace040a6557c72972b5b391edfea191009ee048e3e57a4c1e8747d1703732c597dbcb7f83ba945bdbfbe3939b9b12c1ec703d98c4f198e4e955a5b2a3516a1a4465f725817ae5e6df68dbcd9b5af13bcb922bf4148556f3b45505f9463680e610fb08eaa5ee9fe81"}, {0x80, 0x10e, 0x1, "dd6891a76b550a5e5b6959984eb9a7adbce7aa3208de1ad491376865dbbbdc7ebe9548bbde5d42af3e484bfc4cbf3054e04dc1ce7e51f80cb3b6c4035a8d5c6f451c44103a889a09082d054c371c5276fcad21bd1ec4b14a76e250d175b4ff5d395e2add8e663ccd72af"}, {0x60, 0x10e, 0x6, "e1acdb7a15d2fe7fd52e4e62fa0a0105813e45506bed73ec86802a238975c6fc9a140fe33be2b71ff3d0678c0f7b7ea532e177400c56e1abcdc9117661785b4a385116449cbfba5e56f417"}, {0x58, 0x6, 0xffffffffffff7e34, "705230fe51e95c532b9611a9baa199f0a31d0baa3a9fb3861c65c17d804b547bbe859059c05dde80a7d5f0faefba79e8b48e5c2223b032bacb1e5da04cfb2c332c3607a540a5b9"}], 0x1338}, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$KVM_GET_NR_MMU_PAGES(r1, 0xae45, 0x7) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000003ec0)={{0x6, 0x4, 0x4, 0x80000001}, 'syz0\x00', 0x12}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x5, 0x1000}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x2519, 0x1, 0x8e, 0x4}) 07:50:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 503.733590] input: syz0 as /devices/virtual/input/input279 07:50:32 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000080)={0x0, 0x85fd, 0xffff, 0x4}) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffff9, 0x80482) r2 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_smack_entry(r2, &(0x7f0000000200)='security.SMACK64EXEC\x00', &(0x7f0000000240)='!{\x00', 0x3, 0x3) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000100)) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f0000000140)={{0x1b4a, 0x1ff}, 'port0\x00', 0x8, 0x0, 0x100000001, 0x4, 0x525, 0x1, 0x4, 0x0, 0x0, 0x76f8f4f0}) ioctl$FS_IOC_FSGETXATTR(r1, 0xc0185500, &(0x7f00000000c0)={0xa2, 0x9, 0x0, 0x10000000, 0x80000004}) openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x10000, 0x0) 07:50:32 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:32 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/sy3Bnc_\x01\x00\x00\x00', 0x2, 0x0) write$P9_RREAD(r0, &(0x7f0000000000)=ANY=[@ANYRESDEC=r0], 0x14) fcntl$dupfd(r0, 0x406, r0) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000080)={0x2, 0x5, 0xe3a3, 0x837}) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000100)) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000040)={0xfff, 0x4, 0x6, 0x8}, 0x10) setsockopt$rose(r0, 0x104, 0x5, &(0x7f00000000c0)=0x8, 0x4) 07:50:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x600000000000000) [ 503.811402] input: syz0 as /devices/virtual/input/input280 07:50:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) r1 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r1, &(0x7f0000000100)={0x4, 0x8, 0xfa00, {r2, 0xfff}}, 0x10) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000140)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000200)={{0x1, 0x7, 0x0, 0x100000000, '\x00', 0x7}, 0x4, 0x10000266, 0x8000, r3, 0x4, 0x7fffffff, 'syz0\x00', &(0x7f0000000180)=['\x00', '\x00', 'keyringmd5sumvmnet1wlan0{nodevppp1\\/vboxnet0procppp1wlan0vboxnet0\x00', 'syz1\x00'], 0x49, [], [0x1, 0x81, 0xffffffffffff19d1]}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x5, 0x1000}, 0x18) 07:50:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x3800, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:32 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x9) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) r1 = syz_open_pts(r0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0xe) r2 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f00000001c0)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x1c) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000240)={r3, 0x7, 0x26b, 0x6, 0x6c, 0x3}, 0x14) ioctl$TCFLSH(r1, 0x80047437, 0x712004) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)=0x0) migrate_pages(r4, 0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x81) ioctl$TIOCEXCL(r0, 0x540c) prctl$PR_GET_SECCOMP(0x15) [ 504.029827] input: syz1 as /devices/virtual/input/input281 07:50:32 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000001000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc008551a, &(0x7f0000000000)) 07:50:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x3f00, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 504.076548] input: syz1 as /devices/virtual/input/input282 07:50:32 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:32 executing program 5: r0 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r0, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r0, 0xff) r1 = socket$inet6(0xa, 0x6, 0x0) connect$inet6(r1, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=@dstopts, 0x8) connect(r2, &(0x7f00007a8000)=@generic={0x0, "8c36b043d081c3c1503af6a768406b9267f60ac286da2338bd8e3f6ba990189977170a0705ea90c13e26ba0b966b9b9d3289c8784f16963ce7c312649ce2996cd4e7126f704ab2546e516d216ed2fb7a95ff906185874a2d44029a01f46a380e73c5477efe9e01548612afd6c667be500d748038f499a492ef8fe4e62653"}, 0x80) dup3(r2, r1, 0x0) 07:50:32 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x5, 0x1000}, 0x18) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f0000000080)={0xb, 0x7fffffff, 0x8000}) 07:50:32 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = syz_open_dev$cec(&(0x7f00000005c0)='/dev/cec#\x00', 0x1, 0x2) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000600)=0x40, 0x4) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x0, @dev}, 0x4}}, 0x26) socket$l2tp(0x18, 0x1, 0x1) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x108082}, 0xc, &(0x7f0000000540)={&(0x7f0000000180)=ANY=[@ANYBLOB="9c030000", @ANYRES16=r5, @ANYBLOB="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"], 0x39c}, 0x1, 0x0, 0x0, 0x41}, 0x4) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f00000000c0)=0x9) connect$l2tp(r3, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x32) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r3, 0x111, 0x3, 0x400040, 0x4) 07:50:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x700000000000000) [ 504.307198] input: syz1 as /devices/virtual/input/input283 07:50:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x4000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 504.351134] input: syz1 as /devices/virtual/input/input284 07:50:33 executing program 4: pipe(&(0x7f0000000000)) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0xc008ae88, &(0x7f0000000340)={0x7b, 0x0, [0x2c0000103]}) 07:50:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x410000, 0x0) r2 = accept$nfc_llcp(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000100)={r2}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x5, 0x1000}, 0x18) 07:50:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x800000000000000) 07:50:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:33 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000014, &(0x7f0000000040)=0x4000fffffffe, 0xffffffffffffffbe) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_tcp_int(r0, 0x6, 0x0, &(0x7f0000000100), 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) fcntl$setstatus(r1, 0x4, 0x42803) 07:50:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 504.606762] input: syz1 as /devices/virtual/input/input285 [ 504.670843] input: syz1 as /devices/virtual/input/input286 07:50:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000002000)={0xaa, 0x20}) r4 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101800, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f00000000c0)={0xfff, 0x0, {0x0, 0x3, 0x1, 0x0, 0x10000}}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) setsockopt$inet_mreqsrc(r2, 0x6, 0x2000000000000013, &(0x7f0000013ff4)={@remote}, 0x6) close(r2) dup3(r0, r3, 0x0) 07:50:33 executing program 4: r0 = syz_open_dev$sndtimer(&(0x7f0000014000)='/dev/snd/timer\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x4001ff) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="55fb352400087e4a041dc97c82f1fb5565468a9d3b35e4991a95a0b0bb464ab6c882fbef5e7c9654b0a85dfb4a6934d1ae620061ccdd8d0636e5f0a1d176b54671f677403e73dc7b76685c2eb4fc7cd9c2a0d10be8f5847dd502114063028d0217733f8d3a2cdaf60e475cb2ff37d4a928a91247efda50ff161848c768f9467a587ad6108ccfb7fe4acc7363da114a01ae474ab42d8d5847a7228bf3ea3ab58fa074f9ac361ad88353949c13c4f401d3e1c7a8f8b4aa9a6fe02cf7aeed65f7c54745f2c9f3619b94eb35933c61d9583a42401c535b0aa28006586b1881acea5d0dd78be31900") fsetxattr(r1, &(0x7f0000000040)=@known='user.syz\x00', &(0x7f0000000080)='/dev/snd/timer\x00', 0xf, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 07:50:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0xa00000000000000) 07:50:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:33 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) ioctl$FS_IOC_GETFSLABEL(r0, 0x8906, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) r1 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x5, 0x4000) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) 07:50:33 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x1f) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) sysfs$1(0x1, &(0x7f0000000080)='/dev/uinput\x00') ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x5, 0x1000}, 0x18) 07:50:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0xd00000000000000) 07:50:33 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) r1 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x6, 0x89a735b963a672af) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$SIOCAX25DELUID(r1, 0x89e2, &(0x7f0000000580)={0x3, @null, r2}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) r4 = socket$pppoe(0x18, 0x1, 0x0) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$pppoe(r4, &(0x7f0000000040)={0x18, 0x0, {0x2, @local, 'batadv0\x00'}}, 0x1e) sendmmsg(r4, &(0x7f0000005b40), 0x40000000000014d, 0x0) r6 = syz_open_dev$dspn(&(0x7f00000005c0)='/dev/dsp#\x00', 0x7fffffff, 0x404000) ioctl$DRM_IOCTL_ADD_MAP(r6, 0xc0286415, &(0x7f0000000140)={&(0x7f0000ffc000/0x2000)=nil, 0x7, 0x7, 0x88, &(0x7f0000ffb000/0x3000)=nil, 0x100000000}) r7 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x4, 0x2000) ioctl$KVM_SET_DEVICE_ATTR(r1, 0x4018aee1, &(0x7f0000001ac0)={0x0, 0x3, 0x8001, &(0x7f0000001a80)=0x3}) ioctl$sock_SIOCGPGRP(r7, 0x8904, &(0x7f0000000100)=0x0) r9 = gettid() r10 = getpgrp(0xffffffffffffffff) sendmsg$unix(r6, &(0x7f0000001a40)={&(0x7f0000000600)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000001900)=[{&(0x7f0000000680)="50584aa75e67d4cb87d60f2b55b68aa1eff8754493a2a412f107f5d987189d70e2517f190ebdabd0876c3b81ca8394350f165a250e4c256c5dcf8bd38576df255c424d3904e79379b5cd7646d0914a", 0x4f}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000001700)="b26db8c4028a357954535f578a50f4dd494588873ce2c4f265422470149b93167578fe677266e862ffc4464ab62f6a9a1c583bb386b2e303c0d0c1b7fdd6c3765b45ffcc88763250bafd07ab0bfc690930c8d32147062c1283720b95945b054f440cf3ec06333ceb", 0x68}, {&(0x7f0000001780)="3e42f7ce925ece145e24f5e24d50b668b8a9aa46e041ad59e2824b87fd6ffd726e87351da345aee5b9e8e9425693cbb49b671711562b68aac0ab95918bf9c2d07509e4827d3f3a53ff338ff6ae191d15ac0ac6cbd5c7d68b876d159f81120c18416fba7b5786ec694157ee714da7acd86d929fea3e2eb6e12a65f18925baa102d19f58c062ee3d42be02cdb83d30436406058284726a7def71470c0a2a78686a8497274b20db17326f1d176f813c20424d729b86fe751c730fc9fddf47fd1914372fd1", 0xc3}, {&(0x7f0000001880)="245f0508de864b9984c182348b620ffa1f79b00195e29f6f2fb49d5b74b23469e87cf568974b3293b2b68f2d8026209c48f49a19acee7c7d03f99d6badcf0abd80cf19c2fa80fbf6a858559da8bdfb675cec9cc8708fe18d4b2599d4244f2a154daa594e868d7bfd540efe8f9cd112", 0x6f}], 0x5, &(0x7f0000001980)=[@rights={0x20, 0x1, 0x1, [r6, r0, r1, r1]}, @cred={0x20, 0x1, 0x2, r8, r2, r3}, @cred={0x20, 0x1, 0x2, r9, r2, r3}, @cred={0x20, 0x1, 0x2, r10, r2, r3}, @rights={0x30, 0x1, 0x1, [r7, r7, r1, r4, r5, r1, r7]}], 0xb0, 0x800}, 0x40000) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r6, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9c000000", @ANYRES16=r11, @ANYBLOB="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"], 0x9c}, 0x1, 0x0, 0x0, 0x40}, 0x40) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r7, 0x80045700, &(0x7f00000000c0)) setsockopt$TIPC_IMPORTANCE(r7, 0x10f, 0x7f, &(0x7f0000000200)=0x6, 0x4) 07:50:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 505.362682] input: syz1 as /devices/virtual/input/input287 07:50:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(0xffffffffffffffff, 0x28, 0x1, 0x0, 0x0) socket$kcm(0xa, 0x2, 0x11) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = socket$unix(0x1, 0x1, 0x0) r2 = memfd_create(&(0x7f0000000280)='\x00', 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(r2, 0x400, 0x1) fcntl$setown(r2, 0x8, 0x0) execveat(r2, &(0x7f0000000500)='\x00', 0x0, 0x0, 0x1000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r3, 0x0) socket$unix(0x1, 0x1, 0x0) connect(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x43) connect(r1, &(0x7f0000987ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r4 = gettid() timer_create(0x0, &(0x7f0000ec5000)={0x0, 0x12}, &(0x7f0000044000)) rt_sigprocmask(0x1, &(0x7f0000000080)={0x8}, &(0x7f0000000140), 0x8) clock_gettime(0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f00000000c0)={0xfffffffeffffffff, 0xb, 0x4, 0x60041, {}, {0x3, 0xc, 0x0, 0x80, 0x7, 0x6, "1428ea7a"}, 0x2, 0x4, @fd=r2, 0x4}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r4, 0x1000000000013) listen(r3, 0x0) [ 505.406340] net_ratelimit: 20 callbacks suppressed [ 505.406348] protocol 88fb is buggy, dev hsr_slave_0 [ 505.416432] protocol 88fb is buggy, dev hsr_slave_1 07:50:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x40000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0xf00000000000000) [ 505.470866] input: syz1 as /devices/virtual/input/input288 07:50:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:34 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x5) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x6, 0x0, [], [{0x1, 0x1200, 0x4, 0x400, 0xe00000000000000, 0x968}, {0xfffffffffffffe01, 0x4, 0x8000, 0x8, 0x0, 0x4c3}], [[], [], [], [], [], []]}) write$input_event(r0, &(0x7f0000000000)={{0x77359400}, 0x5, 0x1000}, 0x18) 07:50:34 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf}) gettid() timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x400000, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000040)=0x9, 0x4) 07:50:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 505.757689] input: syz1 as /devices/virtual/input/input289 [ 505.791929] input: syz1 as /devices/virtual/input/input290 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x1000000000000000) 07:50:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='c~redump_filter\x00') pwritev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) [ 505.806304] protocol 88fb is buggy, dev hsr_slave_0 [ 505.811368] protocol 88fb is buggy, dev hsr_slave_1 [ 505.956320] protocol 88fb is buggy, dev hsr_slave_0 [ 505.961497] protocol 88fb is buggy, dev hsr_slave_1 07:50:34 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f00000000c0)=0x100) socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(0x0, 0x0) symlink(&(0x7f00000005c0)='./bus\x00', &(0x7f0000000600)='./bus\x00') creat(&(0x7f0000000700)='./bus\x00', 0x0) 07:50:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:34 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) setsockopt$RXRPC_EXCLUSIVE_CONNECTION(r0, 0x110, 0x3) socket(0x15, 0x80005, 0xfffffffffffffffd) 07:50:34 executing program 4: socketpair$unix(0x1, 0x80000000003, 0x0, &(0x7f0000000100)={0x0, 0x0}) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xac) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r1, 0x0, 0x9, &(0x7f00000013c0)="c5735904880ceb259712a62ca6da1066370ec11b51d0029d0369ef198af65b08ccad14440eb2d510b8ad0094cc42b67f5f4070114584d8ed1c911c4d4a680cb91b0000000000", 0x46) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x8e3, 0x41) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f00000000c0)={0x3fdd, 0x8000, 0x808496, 0x4, 0x0}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000180)={r3, 0x8, 0x3}, &(0x7f00000001c0)=0x8) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) epoll_create1(0x80000) 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x1200000000000000) 07:50:34 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000380)=0x8, 0x4) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x2}]}, 0x10) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x3, 0x82000) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000040)=0x5, 0x8) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8200200}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, r2, 0x220, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x20, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffff}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x40004) 07:50:34 executing program 4: clone(0xfffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x54b, 0x4000) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f0000000040)=0x58) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x3) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x9b}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 07:50:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x2b00000000000000) 07:50:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 506.436331] protocol 88fb is buggy, dev hsr_slave_0 [ 506.441488] protocol 88fb is buggy, dev hsr_slave_1 [ 506.516324] protocol 88fb is buggy, dev hsr_slave_0 [ 506.521492] protocol 88fb is buggy, dev hsr_slave_1 07:50:35 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_GET_MSR_INDEX_LIST(r1, 0xc004ae02, &(0x7f0000000040)=ANY=[@ANYBLOB="294f5bd700000000000000001200000000000000000000000000000000000000a9eb05119567b1ad2c7c9ae56f0715c866a4"]) 07:50:35 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup2(r0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = timerfd_create(0x9, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0xc8) timerfd_settime(r2, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) read(r2, &(0x7f00000000c0)=""/165, 0xa5) 07:50:35 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) symlink(0x0, &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_int(0xffffffffffffffff, 0x21, 0x1b, &(0x7f0000000080)=0x7, 0x4) syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000280)='./file0\x00', 0xe800, 0x1, &(0x7f0000000180)=[{&(0x7f0000000000)="eb3c906d6b66732e66617400020401000200027400f8", 0x16}], 0x0, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fchdir(r1) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x89a0, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f0000000280)={&(0x7f0000ffc000/0x3000)=nil, 0x0, 0x0, 0x0, &(0x7f0000ffa000/0x4000)=nil, 0xe15}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000400)) lsetxattr$security_ima(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000240)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="02b90100f2e66975cf03b0353cdaac30c4"], 0x1, 0x0) r2 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000640)={0xbc, 0x0, 0x100, 0x0, 0x0, [], [], [], 0x0, 0x2}) r3 = socket$l2tp(0x18, 0x1, 0x1) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x8000, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r6 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) write(r5, &(0x7f0000000400)="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", 0x1c0) sendmsg$TIPC_CMD_SET_NODE_ADDR(r5, &(0x7f0000000880)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x24, 0x0, 0x18, 0x70bd27, 0x25dfdbfe, {{}, 0x0, 0x8001, 0x0, {0x8}}}, 0x24}}, 0x0) sendfile(r6, r2, 0x0, 0x10000) r7 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x20000, 0x11) syz_genetlink_get_family_id$team(&(0x7f0000000600)='team\x00') getpeername$packet(r1, &(0x7f00000007c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000008c0)=0x14) accept$packet(r7, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000980)=0x14) accept4$packet(r1, &(0x7f00000009c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000a00)=0x14, 0x80000) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000a40)={{{@in6=@local, @in=@initdev}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@dev, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in6=@initdev}}, &(0x7f0000000c80)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000cc0)={{{@in6=@remote, @in=@multicast2}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f0000000dc0)=0xe8) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000e00)={0x0, @multicast2}, &(0x7f0000000e40)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@mcast2, @in=@empty}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000f80)=0xe8) getsockname(r3, &(0x7f0000000fc0)=@xdp, &(0x7f0000001040)=0x80) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000011c0)={'team0\x00'}) accept(r1, &(0x7f0000001240)=@can, &(0x7f00000012c0)=0x80) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000001600)={@multicast2, @initdev}, &(0x7f0000001640)=0xc) recvmsg(0xffffffffffffffff, &(0x7f0000001840)={&(0x7f0000001680)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/250, 0xfa}, 0x2061) getsockname$packet(r7, &(0x7f0000002ec0), &(0x7f0000002f00)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000002f40)={0x0, @empty, @dev}, &(0x7f0000002f80)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r7, &(0x7f00000037c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000003780)={&(0x7f0000003000)=ANY=[@ANYBLOB="3c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00046a72616e646f6d000038000100240001006e6f746966395f70656572735f636f756e740000000000000000000000000000080003000300000008000400d1000000"], 0x1}, 0x1, 0x0, 0x0, 0x40081}, 0x84) 07:50:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x2d00000000000000) 07:50:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x200000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e22, 0x200, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x5}], 0xfffffffffffffdb9) madvise(&(0x7f0000c24000/0x3000)=nil, 0x3000, 0x4000000000000008) clone(0x0, &(0x7f00000003c0)="6dc4e646c68e08be35b5f805d8492e630971c9493de6ee6dfc158da34ed069ed94274b67d89cceea488867fd246d92cb6b724ca54b70c94b73f75fb3616b2a09dab2ce3c3ff7013da25c2391196e324a35aceaf302a2b3f4275fc9898c639b2a04cdf7e25b51479a012f482081f4f1f0f37f57e629866a2d1076aa8a9931dceb75cc3b38137faaae494a25f7c5379401fa9f90866b0923b5490d409675877011619dcc22cca6faa512a2d2de229ba2890aea201924c303d5e828721fcbf8d017bf505eaf97bd7c4e834751bfe69673a373f8b3e967c1a63ee78486872b91cb7f2efb9b41b4f98b694e04d9ebe15e", 0x0, &(0x7f00000001c0), 0x0) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240), &(0x7f0000000280)=0xc) openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) 07:50:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:35 executing program 3: openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20080, 0x0) syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400402) r0 = syz_open_dev$adsp(&(0x7f0000000280)='/dev/adsp#\x00', 0x7, 0x484a03) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) connect$inet6(r1, 0x0, 0xfffffffffffffed3) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000080)={0x0, {0x2, 0x4e23, @remote}, {0x2, 0x4e24, @remote}, {0x2, 0x4e22, @broadcast}, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffc, &(0x7f0000000040)='irlan0\x00', 0x0, 0x80000001, 0x23}) [ 506.770003] audit: type=1800 audit(1549439435.369:72): pid=23161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="file0" dev="sda1" ino=16648 res=0 [ 506.861239] audit: type=1804 audit(1549439435.369:73): pid=23161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir117043617/syzkaller.gXrTMO/517/file0/file0" dev="sda1" ino=16648 res=1 07:50:35 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000500)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x22040, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r2, 0x0, 0x20000881) sched_setscheduler(0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000006c0)={0x0, 0x0, @pic={0x0, 0xfffffffffffffffd, 0x0, 0x5, 0xb3c}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x484b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) syz_extract_tcp_res(&(0x7f0000000300), 0x401, 0x20) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r5 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value={0x0}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r5, 0x84, 0x77, &(0x7f0000000140)={r6, 0x7, 0x6, [0x8, 0x1, 0x1000, 0x6, 0x5, 0x7]}, 0x14) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, &(0x7f0000000340)={r5, r4, 0x8}) 07:50:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x3400000000000000) 07:50:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:35 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) fcntl$getownex(r0, 0x10, &(0x7f0000000280)={0x0, 0x0}) syz_open_procfs(r1, &(0x7f00000002c0)='map_files\x00') r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = accept4(r0, 0x0, 0x0, 0x0) r4 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x80000001, 0x10000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x100f}}, 0x20) syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') write$RDMA_USER_CM_CMD_ACCEPT(r4, &(0x7f0000000140)={0x8, 0x120, 0xfa00, {0x3, {0x40400000000, 0x5, "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", 0xc9, 0x1ff, 0x80000001, 0x8001, 0xffffffffffffea89, 0x7, 0x3ff}, r5}}, 0x128) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], 0x0) [ 506.894090] audit: type=1804 audit(1549439435.419:74): pid=23161 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir117043617/syzkaller.gXrTMO/517/file0/file0" dev="sda1" ino=16648 res=1 [ 506.932456] audit: type=1804 audit(1549439435.419:75): pid=23153 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir117043617/syzkaller.gXrTMO/517/file0/file0" dev="sda1" ino=16648 res=1 07:50:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:36 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x101, 0x0) pipe(0x0) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:tetex_data_t:s0\x00', 0x22) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0x80045500, &(0x7f0000000080)) 07:50:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x3d00000000000000) 07:50:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x9000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:36 executing program 3: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x1, 0x2, 0x7fffffff}, &(0x7f0000000040)=0x10) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x70, 0x0, 0x3, "94e78f1f2be1e43ef73f950323b60ea9", "890b25b5d0375750408167cc171c12daf5de1e37d037fd87a4814a15b02350176b822ab299cb337d283344b72932813669a1a1b124b58c8073f3c4c9aa2fcac50d0994511ba1fb5605954de97610c407d398d2f15a31835c3c8d8e"}, 0x70, 0x3) readv(r0, &(0x7f00000004c0)=[{&(0x7f00000002c0)=""/208, 0xd0}], 0x1) 07:50:36 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) r1 = dup(0xffffffffffffffff) setsockopt$sock_void(r1, 0x1, 0x3f, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0xffffffffffffbc2a, 0x2, 0x0, 0x7ff}) recvfrom$llc(r1, &(0x7f0000000000)=""/97, 0x61, 0x0, &(0x7f0000000080)={0x1a, 0x324, 0x0, 0x80000001, 0x10001, 0x1, @local}, 0x10) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000400)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x200000000, 0x0, 0x0, 0xfffffffffffffff7, 0x20000000008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$netlink(r1, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfb, 0x4000}, 0xc) statx(0xffffffffffffffff, &(0x7f0000000280)='./bus/../file0\x00', 0x0, 0x0, &(0x7f00000002c0)) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f00000003c0)={0x3}, 0x1) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000180)) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00T\x00\x00\x00\x00\x01\x00', @ifru_names='bond_slave_1\x00'}) [ 507.751416] bond0: Releasing backup interface bond_slave_1 07:50:36 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') readv(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000000)={0x3, 0x14, [0x7fffffff, 0x20, 0x7, 0xffd1, 0x3ff]}) readv(r0, &(0x7f0000000580), 0x28e) 07:50:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:36 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x25dfdbfe}, 0xc) bind$netlink(r0, &(0x7f00000000c0)={0x10, 0x0, 0x27dfdbfe, 0x1}, 0xfffffffffffffc68) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x101000, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x5, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:50:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x4700000000000000) 07:50:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:36 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x3f, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) sendmmsg$alg(r0, &(0x7f00000004c0)=[{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000000)="30204791b9fc1c81fc0002a43e20453b7492b41ee0c65036cf3141e91fdea6fe889a2bab3220a15891423fc4cdb3d64b5082ad7a27169ea8f85d7d237db77a8998a848baf1ad9de5a4c1f9d1", 0x4c}, {&(0x7f00000000c0)="0b99c9867c6c30c0103d69400ebba7eeb6", 0x11}, {&(0x7f0000000100)="9fcbb8ac0c3a7953800a9f3588f81100e880c9c78e5adbaffdcf11928cecbf551c3ef536c3d776a39a3a5d9ab72b2cb6a9c80d57de6ec54c0e6370b0b2ccf087d12a1487554f0f96573f2000a7b02f90b79dc89a967e13eca9dad197afe42bcc805e5d4aabb27e78136e8888985931b3eeca7e7e101a10fb7cdaa6697a44dfebbcd0d9f1e2d8f442892e490c0bbe94b6cf", 0x91}, {&(0x7f00000001c0)="0b4b4ae6a37ff2220ebc9dbd2c406f530e7b0b96ee9c0b13be1116670d20c2bb5136f506daee6c834ead3edcf105ce344d4b5cd48fba89cb3b25d4020447000ae9e1f8406331607e42bd9c27f8ebf06211a05810df8fa7c0543c67e587b1f3ea3f41c8531340182547b784bd891f", 0x6e}, {&(0x7f0000000240)="6f06f3cd7156d1f383b0bdecf11253ad3c829ad574fc90280850f7296feaf7d7040566492eabfc075928f8699be8a3800efc6d68d1ce5f9556bcb321b3ecc2a1ecaf5bc296d38111509813547825b99af822eeb8f2e2a90b92d148b47ba09d82bff033b7a1aae9560042da643ddbaccef2043e5ea9e12cfb910d1a1aaf71bc6595a197270da6259775e020a0b55b433fe7b1df24e8f7933e749815aaa7c81a67a0f75b435dd56fbc1163844855e3ee41bbce51fb053c1ad3fcd46fae3c4fffa3403470a4c1511b59a2cf6f7a5de438c3edb5b04dc807570c271f66b52edddaeae1e11ac70ef3b2", 0xe7}], 0x5, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000017010000040000000700000000000000b000000000000000170100000200000099000000f34c26e0f4f07483f89f84cd74e740436d9133855499da6ca29d506f56f319e2f012ab1755598daf5bef0c926be4f07b4768884b47e0aab5cb1e400e93f0358229e300a83495b0a1e2e91638cd484107ce5343e3daf95edd391f5173fc000b2cbd1769848a3aede138de0d2432f4144ca2f858276aa21c92bac87e432ff85d6eee02c83437d616555e1859749f8344969e78bc4399572847b7000000180000000000000000001800000000000000170100000300000001000000000000000000000000000000000000000000"], 0xf8, 0x800}], 0x1, 0x24004855) 07:50:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000000)=0x0) process_vm_readv(r1, &(0x7f0000000180)=[{&(0x7f0000000040)=""/54, 0x36}, {&(0x7f0000000080)=""/220, 0xdc}], 0x1, &(0x7f00000008c0)=[{&(0x7f0000000540)=""/131}, {&(0x7f0000000280)=""/5}, {&(0x7f0000000940)=""/129}, {&(0x7f00000002c0)=""/53}, {&(0x7f00000006c0)=""/11}, {&(0x7f0000000700)=""/124}, {&(0x7f0000000780)=""/202}, {&(0x7f0000000880)=""/31}], 0x0, 0x0) keyctl$setperm(0x5, r0, 0xc000010) keyctl$revoke(0x3, r0) 07:50:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c, 0x0}], 0x1, 0x0) [ 508.209901] bond0: Enslaving bond_slave_1 as an active interface with an up link 07:50:36 executing program 5: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20000fff}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0xc020660b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x7, 0x6, 0x980000}) [ 508.263934] bond0: Releasing backup interface bond_slave_1 07:50:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x10000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x4800000000000000) 07:50:37 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl(r0, 0x2000c0884123, &(0x7f0000000000)) 07:50:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:37 executing program 5: unshare(0x40000000) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) write$cgroup_type(r0, &(0x7f0000000080)='threaded\x00', 0x9) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x7, {0x1000}}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x54) 07:50:37 executing program 3: unshare(0x20020000) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mkdir(&(0x7f00001a3000)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='tmpfs\x00', 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$IOC_PR_PREEMPT(r0, 0x401870cb, &(0x7f0000000080)={0x20, 0x3, 0x8, 0xfff}) poll(0x0, 0x0, 0x400007f) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') [ 508.496934] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 508.569948] IPVS: ftp: loaded support on port[0] = 21 07:50:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:37 executing program 4: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x200000000000013, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f0000000340)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES16=r5, @ANYBLOB="000325bd7000ffdbdf2501000000000000000141000000180017000000200000003f69623a7465716c3000000000"], 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1f, 0x0, &(0x7f00000002c0)) sendfile(r2, r3, 0x0, 0x1) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000003c0)) r6 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x200000008000000, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r6, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) 07:50:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x4c00000000000000) 07:50:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x6800000000000000) 07:50:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 509.063671] IPVS: ftp: loaded support on port[0] = 21 07:50:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:38 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f00000001c0)={0x18, 0x0, {0x100006, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 'ip6_vti0\x00'}}, 0x1e) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={0x0, 0xffffffffffff0001, 0x4}, &(0x7f0000000300)=0x8) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000280), &(0x7f0000000340)=0x4) dup2(r2, r2) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x23, &(0x7f00000002c0)={r3, 0x8000000000000000}, 0x8) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syzkaller1\x00', 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000040)={0x0, 0x9}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={r4, @in6={{0xa, 0x4e24, 0xffffffff, @mcast1, 0x7}}, 0xffff, 0x9409, 0x7fffdfff, 0x101, 0x4c}, &(0x7f0000000200)=0x98) dup2(0xffffffffffffffff, r1) 07:50:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x6c00000000000000) 07:50:38 executing program 5: io_setup(0x40000100000003, &(0x7f0000000000)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x10200, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x0) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000040), &(0x7f0000000080)=0x4) 07:50:38 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1b, &(0x7f0000000100)={0x0, 0x1c, "d2076ce631908b6763aa7cf34b571414bba1e12e19f153acba17f948"}, &(0x7f0000000140)=0x24) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x9, 0x3, 0x6}, &(0x7f00000001c0)=0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3ff, 0x2) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x4040) 07:50:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:38 executing program 4: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) close(r1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='\x00') write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x27d9ef0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r2, 0x0, 0xffffffffffffff62, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r2, &(0x7f00000008c0)="03", 0x1, 0xfffffffffffffffe, 0x0, 0x0) splice(r2, 0x0, r1, 0x0, 0x810005, 0xa) 07:50:38 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x21ffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000402}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x80, r1, 0x300, 0x70bd28, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x1000}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x10}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1f}]}, 0x80}, 0x1, 0x0, 0x0, 0xde7e8e8c510eb9cf}, 0x4000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000002c0)={&(0x7f000025c000/0x3000)=nil, &(0x7f0000052000/0x1000)=nil, &(0x7f0000036000/0x2000)=nil, &(0x7f00004b6000/0x1000)=nil, &(0x7f00004a4000/0x1000)=nil, &(0x7f00007bb000/0x1000)=nil, &(0x7f0000363000/0x1000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000027000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68) 07:50:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x40000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_NMI(r2, 0xae9a) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000080)="0adc1f023c123f3188a070") ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f0000000000)={0x200, 0x4, 0x100000000, 0x1, 0x401}) ioctl$KVM_TPR_ACCESS_REPORTING(r2, 0xc028ae92, &(0x7f00000000c0)={0x9, 0x4}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) r4 = fcntl$dupfd(r0, 0x0, r0) ioctl$HDIO_GETGEO(r4, 0x301, &(0x7f0000000040)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 07:50:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x7400000000000000) 07:50:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x20100000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:38 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x1, 0x1) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = openat$audio(0xffffffffffffff9c, 0xffffffffffffffff, 0x4000, 0x0) fchmodat(r2, &(0x7f0000000000)='./file0\x00', 0x100) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x1, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000080)={0x3f, 0xb97, 0x2, 0x7, 0x14, 0x59, 0x401, 0x10000, 0x1d, 0x9}) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:50:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x7a00000000000000) 07:50:38 executing program 3: r0 = semget$private(0x0, 0x3, 0x100) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000000)=""/193) r1 = socket$vsock_stream(0x28, 0x1, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x80000000) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000140)=@add_del={0x2, &(0x7f0000000100)='veth0\x00'}) 07:50:39 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000440)='/dev/capi20\x00', 0x0, 0x0) pipe(0x0) r0 = open(0x0, 0x0, 0x101) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_TIMERSLACK(0x1d, 0x3) mq_open(0x0, 0x0, 0x100, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, 0x0) timer_create(0x0, 0x0, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$TEAM_CMD_OPTIONS_GET(0xffffffffffffffff, 0x0, 0x20000000) ioctl$EVIOCGID(r0, 0x80084502, &(0x7f0000000000)=""/16) ioctl$PPPIOCATTCHAN(0xffffffffffffffff, 0x40047438, 0x0) r1 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r1, &(0x7f0000022ff0)={0x2, 0x4e20, @loopback}, 0x10) sendmsg(r1, &(0x7f000001afc8)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f0000007f80)=[{&(0x7f000000a000)='\f', 0x1}], 0x1}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000500)={0x963, 0x2, 0x10001, 0x0, 0x0}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000580)={r2, 0x3}, &(0x7f00000005c0)=0x8) gettid() sendmsg(0xffffffffffffffff, &(0x7f000001afc8)={0x0, 0x0, &(0x7f0000007f80)=[{&(0x7f000000a000)}], 0x1}, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) 07:50:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1402, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xa, 0x100) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) r1 = socket$kcm(0xa, 0x3, 0x11) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f0000000140)=@un=@abs, 0xfffffffffffffe70, 0x0, 0x0, 0x0, 0x2bf}, 0x0) 07:50:39 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="05000000400000000d000040050000d90000004000fa00000000004000030000010000000000000025000000ffb0ffff04040000000000000a00000006edce9c"]) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x186, 0x0, 0x403000}]}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000000c0)={0xffffffffffffffff}, 0x13f, 0x6}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {r4, 0x80}}, 0x10) 07:50:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x38000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0xfeffffff00000000) [ 510.596343] net_ratelimit: 20 callbacks suppressed [ 510.596350] protocol 88fb is buggy, dev hsr_slave_0 [ 510.606487] protocol 88fb is buggy, dev hsr_slave_1 07:50:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0xfffffffffffffffd) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x0, 0x120210c}, 0xc) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x300000000}, 0xfffffffffffffddb) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000000)=0xffffffff, 0x4) r2 = socket(0x200000000010, 0x2, 0x0) sendmsg$nl_generic(r1, &(0x7f00001cb000)={0x0, 0x0, &(0x7f0000f4a000)={&(0x7f000019bf9b)=ANY=[@ANYBLOB="140000002a00110300000000000000a4270f0d00"], 0x14}}, 0x0) write(r2, &(0x7f000095c000)="2400000026007f000000000000007701000000ff0100000000000000ffffffff0100ff10", 0x24) [ 510.669678] kvm_pmu: event creation failed -2 [ 510.676327] protocol 88fb is buggy, dev hsr_slave_0 [ 510.681409] protocol 88fb is buggy, dev hsr_slave_1 07:50:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:39 executing program 3: socket$packet(0x11, 0x3, 0x300) r0 = socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000100)=0x1000000000000002, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) socket$packet(0x11, 0x2, 0x300) recvmmsg(r0, &(0x7f0000004700)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 07:50:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0xff01000000000000) 07:50:39 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) mount(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x17fffff, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x100000, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x200) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x27, 0x0, "040acdf9a54a99fbfd983cfd3a43e21dfce18fdc3e75697e6bab205c00ba62"}, &(0x7f0000000040), 0x1400) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x2) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) [ 511.236325] protocol 88fb is buggy, dev hsr_slave_0 [ 511.241424] protocol 88fb is buggy, dev hsr_slave_1 07:50:39 executing program 5: prctl$PR_GET_FPEXC(0xb, &(0x7f0000000080)) r0 = request_key(&(0x7f00000000c0)='.dead\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)='trusted\x00', 0xfffffffffffffffc) add_key(&(0x7f0000000000)='t\x01\x00\x00\x00Kd\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, r0) 07:50:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000580)='/dev/amidi#\x00', 0x9, 0x800) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f00000005c0)={'security\x00'}, &(0x7f0000000640)=0x54) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000200)='./file0\x00', r2, r3) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x2000, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000680)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0xb0, r4, 0x322, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1607f547}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfff}]}]}, 0xb0}, 0x1, 0x0, 0x0, 0x10}, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r5, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) uselib(&(0x7f00000006c0)='./file0\x00') 07:50:39 executing program 4: perf_event_open(&(0x7f00000002c0)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/fib_trie\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 07:50:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:40 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x3f000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:40 executing program 3: r0 = socket$inet6(0xa, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x16, 0x0, 0x0) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x8100, 0x0) ioctl$BLKBSZSET(r1, 0x40081271, &(0x7f0000000040)=0x7) 07:50:40 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:40 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) perf_event_open(&(0x7f0000000080)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10036, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syncfs(r0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 07:50:40 executing program 5: r0 = socket$kcm(0x10, 0x20000009, 0x10) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x40) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000140)={0x18, 0x1, 0x0, {0xffffffff}}, 0x18) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r2, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = dup2(r2, r2) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000600)) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000540)) fcntl$setstatus(r2, 0x4, 0x2000) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000380)={0x1, &(0x7f0000000180)=[{0x8, 0xfffffffffffff9b8, 0xf6, 0xf62}]}, 0x10) ioctl$KVM_SET_MSRS(r1, 0x4008ae89, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000000000061080000000000000200400600000000"]) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0xfffffffffffffffd) ioctl$GIO_FONTX(r4, 0x4b6b, &(0x7f0000000400)=""/114) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000001c0)=0x80, 0xc3) ftruncate(r4, 0x80003) r5 = semget$private(0x0, 0x40007, 0x1000000000000001) semctl$SETVAL(r5, 0x4, 0x10, &(0x7f0000000300)=0x3598acf) sendfile(r2, r4, &(0x7f00000000c0)=0x81, 0x1) keyctl$join(0x1, &(0x7f0000000580)={'syz', 0x1}) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@dev={0xfe, 0x80, [], 0x11}, @in=@broadcast, 0x4e20, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x4000}, {0x7fffffff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x38dc}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x33}, 0x0, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xe8) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d00060000001000034001000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) r6 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kvm\x00', 0x0, 0x0) r7 = ioctl$KVM_CREATE_VM(r6, 0xae01, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f0000000480)=0xa) r8 = ioctl$KVM_CREATE_VCPU(r7, 0xae41, 0x0) ioctl$SIOCGSTAMP(r2, 0x8906, &(0x7f0000000340)) ioctl$KVM_SET_VCPU_EVENTS(r8, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) 07:50:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0af51f023c123f3188a070") mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = inotify_init() inotify_add_watch(r3, &(0x7f0000000040)='./file0\x00', 0x40000000) umount2(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) fanotify_init(0x11, 0x109000) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:40 executing program 3: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, 0x0) r1 = eventfd(0x0) write$binfmt_script(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="2b21703788610e4e"], 0x8) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000857ff8)={0x0, r1}) read$eventfd(r1, &(0x7f0000000040), 0xfffffcc6) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(0xffffffffffffff9c, 0xc10c5541, &(0x7f00000000c0)={0x7effbe68, 0x28, 0xff, 0x0, 0x0, [], [], [], 0x81, 0x1}) 07:50:40 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 511.636308] protocol 88fb is buggy, dev hsr_slave_0 [ 511.641484] protocol 88fb is buggy, dev hsr_slave_1 07:50:40 executing program 4: r0 = gettid() socketpair$unix(0x1, 0x1000000005, 0x0, &(0x7f000087fff8)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r1, 0x5452, &(0x7f0000008ff8)=0x3f) fcntl$setsig(r1, 0xa, 0x12) fcntl$setownex(r1, 0xf, &(0x7f0000000040)={0x0, r0}) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) recvmsg(r2, &(0x7f0000172fc8)={0x0, 0x0, 0x0}, 0x0) r3 = dup2(r1, r2) r4 = gettid() tkill(r4, 0x16) shutdown(r2, 0x1) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) 07:50:40 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:40 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:40 executing program 3: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000100)="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", 0xfc) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000040)) [ 512.036336] protocol 88fb is buggy, dev hsr_slave_0 [ 512.041492] protocol 88fb is buggy, dev hsr_slave_1 [ 512.091297] netlink: 176 bytes leftover after parsing attributes in process `syz-executor3'. [ 512.102052] netlink: 176 bytes leftover after parsing attributes in process `syz-executor3'. 07:50:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x40000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:41 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:41 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000000)=@get={0x1, 0x0}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa8}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x2710, @host}, 0x10) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 07:50:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="8237b73d09f46b8dae6a80aed4099fbf27223496c8f27faf5a6af85c2fbd79aa3534f2a0ca2f65551128173ac4870ba95d13f5fbc9492ac02707dad91113531813706fc21f5c88659901b46f8450db6a2105aa"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 512.479167] cgroup: fork rejected by pids controller in /syz5 [ 514.258617] IPVS: ftp: loaded support on port[0] = 21 [ 514.289029] device bridge_slave_1 left promiscuous mode [ 514.294647] bridge0: port 2(bridge_slave_1) entered disabled state [ 514.337134] device bridge_slave_0 left promiscuous mode [ 514.342612] bridge0: port 1(bridge_slave_0) entered disabled state [ 515.796378] net_ratelimit: 20 callbacks suppressed [ 515.796387] protocol 88fb is buggy, dev hsr_slave_0 [ 515.806595] protocol 88fb is buggy, dev hsr_slave_1 [ 516.356370] protocol 88fb is buggy, dev hsr_slave_0 [ 516.361560] protocol 88fb is buggy, dev hsr_slave_1 [ 516.836316] protocol 88fb is buggy, dev hsr_slave_0 [ 516.841396] protocol 88fb is buggy, dev hsr_slave_1 [ 516.926338] protocol 88fb is buggy, dev hsr_slave_0 [ 516.931407] protocol 88fb is buggy, dev hsr_slave_1 [ 517.476406] protocol 88fb is buggy, dev hsr_slave_0 [ 517.481511] protocol 88fb is buggy, dev hsr_slave_1 [ 517.728962] device hsr_slave_1 left promiscuous mode [ 517.799905] device hsr_slave_0 left promiscuous mode [ 517.860051] team0 (unregistering): Port device team_slave_1 removed [ 517.873116] team0 (unregistering): Port device team_slave_0 removed [ 517.884267] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 517.942149] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 518.019339] bond0 (unregistering): Released all slaves [ 518.138367] chnl_net:caif_netlink_parms(): no params data found [ 518.168191] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.174565] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.181530] device bridge_slave_0 entered promiscuous mode [ 518.188538] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.194934] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.202179] device bridge_slave_1 entered promiscuous mode [ 518.216903] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 518.225586] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 518.242832] team0: Port device team_slave_0 added [ 518.248987] team0: Port device team_slave_1 added [ 518.317964] device hsr_slave_0 entered promiscuous mode [ 518.366663] device hsr_slave_1 entered promiscuous mode [ 518.420028] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.426403] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.432962] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.439338] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.549297] 8021q: adding VLAN 0 to HW filter on device bond0 [ 518.562362] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 518.571119] bridge0: port 1(bridge_slave_0) entered disabled state [ 518.578593] bridge0: port 2(bridge_slave_1) entered disabled state [ 518.599646] 8021q: adding VLAN 0 to HW filter on device team0 [ 518.609025] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 518.616884] bridge0: port 1(bridge_slave_0) entered blocking state [ 518.623214] bridge0: port 1(bridge_slave_0) entered forwarding state [ 518.647952] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 518.655562] bridge0: port 2(bridge_slave_1) entered blocking state [ 518.661950] bridge0: port 2(bridge_slave_1) entered forwarding state [ 518.671887] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 518.680475] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 518.693948] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 518.701735] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 518.716789] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 518.732492] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 518.741441] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 520.996565] net_ratelimit: 22 callbacks suppressed [ 520.996571] protocol 88fb is buggy, dev hsr_slave_0 [ 521.006665] protocol 88fb is buggy, dev hsr_slave_1 [ 521.076445] protocol 88fb is buggy, dev hsr_slave_0 [ 521.081540] protocol 88fb is buggy, dev hsr_slave_1 [ 521.236491] protocol 88fb is buggy, dev hsr_slave_0 [ 521.241566] protocol 88fb is buggy, dev hsr_slave_1 [ 521.636437] protocol 88fb is buggy, dev hsr_slave_0 [ 521.641630] protocol 88fb is buggy, dev hsr_slave_1 [ 522.036448] protocol 88fb is buggy, dev hsr_slave_0 [ 522.041631] protocol 88fb is buggy, dev hsr_slave_1 07:50:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x2098, 0x0, &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2'}, 0x381) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20}], 0x20}, 0x60) 07:50:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:51 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x28000000, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0xa, 0x20) r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x1, 0x2) sendmsg$alg(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)="d2e053a6c59b5408221c2dac5940b14b1e20391ac5fd4e73a065f6e11e196dd860502963d9c5aaaaf8047b3f4b3381c0bc3b439735b38a7f3cf5fe618b0303bf568f1038802778c10c1df2436b1f7f98b3cb34a6c1975e2c2f5a0f70577c03b4ca6ef8051aabf588c2d8b586a593abdc7c1fd63bfbf330c838e960cc86507b1d54f4984f1bbf237623ce670a7fcd39fa74e44d40cb7bd445f7030b05f3b67114e5bc5f2e0c44", 0xa6}], 0x1, &(0x7f0000000280)=[@op={0x18}, @iv={0xd0, 0x117, 0x2, 0xbc, "b9a0de98241525f10789de66c25c6e3fb30899a3f337bc8963c758a9ede9f17f6a84272caec8f3f403ecfa75c11d34811a3515e6816602a5ead9c55bdbae216f8212ae3c38b89143036064e1384fe2501c5c629e436f0d95bf42e4af9fbbf1a2ef8c3952363237b6248799ffb4c182f7e74cb6b71edd86e37a83043be5a7bcbdac928db57c11c211ea15e33b2ab7dabee342e10bf34803d8c2b1ed8294c83bc1e3a4e498d0ee2f2cccd560071b9d3abbec95ac2689629adb063f71bc"}, @iv={0x68, 0x117, 0x2, 0x4d, "c875ca9d41bc794ce6ef468106d94b5d9373593d8f7dce0816b878fc33e5ba2ba700258a154f60915de71aed737ff926e8c80ec290dc6530ee6df266199c31f590b9b23baf1401017509a5e043"}], 0x150, 0x4000}, 0x40000) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000000)={0x0, 0x8001, 0x0, 0x1}, &(0x7f0000000040)=0x10) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f0000000080)={r3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xe) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000bdb000/0x4000)=nil) 07:50:51 executing program 4: mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r2 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$PPPIOCGDEBUG(r2, 0x80047441, &(0x7f0000000040)) getsockopt$inet6_tcp_int(r1, 0x6, 0x0, 0x0, &(0x7f00000001c0)) 07:50:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x10000, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000600)=ANY=[@ANYBLOB="41419b55772afa702e20437bb4c6c71233d338c42ac767c50da8ae703750577116d40cf05769af01040bd4aae0e02700b84a651c609f13f87d9f3584ee536da12cf3bd44281ea76fd9d44d1632655091d4a4f5b8490025cd98528f74e3cb511d8fea13f1bb52b7372910036be972ed5a6962d62aeda3b799a0c3b764ef87be4f1b6f5d59db126c067680987e771674429c973f4bbe52d22753e83788fd799254ac29c5d2d4fbebe7e50e2fbae63268ec3cd81f70bcb9c0fdc6417a63b8e63176026617b570af170d"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000002c0)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000500)={0x0, 0x6f, "a515748e0506d3dced32098db313bfaafc4c9ab89207007b02276929b408aa70171ed8120aa7ffcbef461cb2cfa3bb06576abcc336cbdda18545b9671d8be0a99f4bc12322746a535fac88e349150157b630c81d00a00dab6cd4caf661e7bb80d92b4527fd2a9811f66b813d4e0dee"}, &(0x7f0000000580)=0x77) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000005c0)={0x3b1e, 0x0, 0x200, 0x36c6, 0xe59f, 0x10000, 0x6, 0x7, r3}, 0x20) quotactl(0x11f, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000400)="9c52fa252719b8088ad8e0fac76c14052b094fd41933803aef5f1c3bff31c4116cbe8d03c2e47570f1d1ff38e7c457516e40676f28a855b1d0d2e23fb7e9ca7936327d7235efe3e7c0de1cc066e7b351f39e98b8deca33c9a110ba2d12e15c938f0a67ba7e1b5ab2438b267fc760b440d1f98c6aaed78113656698215e80e0ea729345a6d22ff689bf10cd5f6d02a238db9c4c756d4e6f786a3147c48f506183bd850352119899e64a09370d544f4907b3b332099428fba97cedfa687d46e55e02147d893c95541408afb2b119") 07:50:51 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x47ba94f7, 0x400000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80004}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x44, r1, 0x800, 0x70bd2a, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffffffffff81}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3f}]}]}, 0x44}, 0x1, 0x0, 0x0, 0x4040}, 0x20000000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0385720, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x1, [0xfffffffe]}) 07:50:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc300100000000000000") mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x1000000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 522.892288] syz-executor3 uses obsolete (PF_INET,SOCK_PACKET) 07:50:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xc0ed0000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:51 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0xf4f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x8a, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000140)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 07:50:51 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000a80)=ANY=[@ANYBLOB="31cc00001a000100000000000000000091637b1d92089c31243eaa219c7d543ee000000200000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff010000000000000000000000000001000000006c000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000"], 0xf0}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='loginuid\x00') ioctl$KDDELIO(r1, 0x4b35, 0x7772) ioctl$RTC_AIE_OFF(r1, 0x7002) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000180)={r2, @in={{0x2, 0x4e21, @multicast1}}}, 0x84) 07:50:51 executing program 4: msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000480)={{}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001}) r0 = syz_open_dev$dspn(&(0x7f0000000d80)='/dev/dsp#\x00', 0x3f0000000, 0x40300) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000dc0)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000e00)={@local, @empty, @empty, 0x1, 0x0, 0x1d, 0x100, 0x156a00000, 0x2000004, r1}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000140)={'filter\x00', 0x0, 0x4, 0x9f, [], 0x1, &(0x7f0000000040)=[{}], &(0x7f0000000080)=""/159}, &(0x7f00000001c0)=0x78) prctl$PR_SET_PDEATHSIG(0x1, 0x20) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000880)={{{@in=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000980)=0xe8) sendmmsg(r2, &(0x7f0000000cc0)=[{{&(0x7f0000000200)=@x25={0x9, @null=' \x00'}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000280)="07de94698262417b63483266578368cf427b55621dfd51bedf4c5d41d2151f89bc886fa6cba7a4832c253b9cd0ae7c1b4ba061763e1918bb5461dd85fb246dee4146619b573ffc532b8214cd49f36708c973f07fc168da602e2f111d388b3df8fd514a369494e47b9252787d820ccb41b2264f28b13cdd30d8416307b97ddbab411ade287baac05ad523804385a9d0c4077d7931db20cbb9a1a93d017d8ab214a194f9eafe0dbd33b9684470523910a1207856a74a78812d2ec1ab215dfebe82264b348ab7b42f4733d3f1624b8237590e", 0xd1}, {&(0x7f0000000380)="913fc3c30fdd684c8636ad8dd1ae292b395c838e9c61bf97d853013c4f524173416ea0f87cdd2cbf2bfc5d51e08b9f0533240ada4e89f6253933873110e3942f860d58068be755f4df721aedf479a591abed898a4c704f39465aa730baea9634ac877e5a0d2e70b96f", 0x69}, {&(0x7f0000000400)="8b243b2f24d0e4a79b590657ef5d260a2a2d954ac7583517f7937f5408775a2ef7bb6d41ef", 0x25}], 0x3}, 0x6}, {{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)="ddd09a531540218545a5a7b99096d7bd413af6ae8d29a307be6a50655a9052cc565f9add1010b3da8d3af2b5b60e1c3b40b2ceccb7ae7ee55386dd323a1fce602ad39f361a840a6b8039217b357bf386a73509233b05227c466ba9fb", 0x5c}], 0x1, &(0x7f00000005c0)=[{0x38, 0x11c, 0x9, "f0a2db2c143e36386a55eab1e56e68d45eb8bbb9ba45a52bd0f87402978027ec57f8"}, {0x88, 0x0, 0x3, "ec923a092cf50fd2ecb6454998717ded4e9b541d1301681559f2befe18eed099844897b7c50cdb6985c2f9bdd0bba8f3b3244699cc214547f967ecf5f90412cb4ef2a9f95b37c6071f907a5300317fc6d746abcd2d207b389a2e2de9bf9618ac08d398602afad7d870479da94d1e8a3e407c"}, {0x78, 0x115, 0x3a, "fab9c44eab804178670db1235ea2b035c8a6e4f8699cef4c89c87f9313b7fbf11d0d63de5da2083ba81d16e6af31328f35910ead1564a416bd7717ccb1750934cafe009dbef9b7a48801bda6adf65ebb5f1935fabea97262796c40a93dfc9c4a17e16754a8"}, {0x58, 0x10e, 0x40, "75b56a8618a6d5dc436dce5cd99f15ce06313551e96c5da931feb8b1003f28c48af41ac0fcb44e530e916edc917e2229311c95ce280f764dea4db20147d982800f5d475875"}, {0xd0, 0x107, 0x1ba, "a85964f9994936b63f376c45816b466f87251a62c264707106f30564a4d1b19535c4525aafc0cc3e117dee1d26050e5f80b61fd949f25d3b174fdfc978c7cac8d71ee99f27040f27f57b8023ed7913d27c1b39b005ea323d4799d1d505ac4d80516ff4dfa9b0d3aac0a801c24952255b72ddf710b3034c0ea11c72214dbc1461c40fab63fa0cd4f49c4cc81f75ec83454266b3473a60bffee0a3a5ebe40320f4650e0ecdf3cb399608d7daac5acbbcf48e9b711c8468e732ce8a7c21f4f49bbd"}, {0x40, 0x109, 0x5, "79d62f53109db68a0be8932525855fe60a6263c9ad70602ba5b0dfe875b48c4f5feb4436b0a2d0f019b15179ff8be8"}], 0x2a0}, 0x401}, {{&(0x7f00000009c0)=@ll={0x11, 0x18, r3, 0x1, 0x6, 0x6, @local}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a40)="ed4e78aaba097771f3b33f26cfa9362c68b3a17eca57004d88a16e9dc5258d91885f0cec1b0bd3f7d37c9c0e6395f96431998ef005", 0x35}, {&(0x7f0000000a80)="4b72e0220d2db3e241cf9664853e791998ad4b581bad71eb2c79d7debc6957c1aecb1deb85866cb4cf81faa1f55bbfa6b061ca24e4101ddb07416817b94113b1c3d8393a2fc583de1b54ec831da091d96d91c9fb8991545a9895735f4c4d03c9f7babeaa199797d719399b4e96630119b1b202a1b121b10b968713de806d39ada12e53ad5cb041af7094e2cc33", 0x8d}, {&(0x7f0000000b40)="c27cffa82f099e08294c281ff288eba903259d044b8c568ffdfd6a1c4798a3f7a4239c7ae45602b01b3a1a283557d447e6a22dece1d60aaa8351c9dbd15f5f7dd3d24bd4a204e9d0437fbd553b392ca1a20f480e4fde1f8317b566a2c6a3da805ce5e9c612e53620a39f729f940308c7fc4abe5db7bcf9f3fd7acf442f3c8d3f0eb7b84faa334816a4a640076a7944debe6a5fe18ddf00cb9aed4516ef3a5874e7b3da7d6c3ba646fec1df35b9453b881e772b93fc03fabc020c518f0d34c1379f3cec0bb7", 0xc5}, {&(0x7f0000000c40)="e305862acbb77267de1adf494cf985330448681d20f54ec6124adf1a1cf78ea78a1c86a9f0b2d522676ec76466c0cd1506a35c", 0x33}], 0x4}, 0x81}], 0x3, 0x4) 07:50:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f00000002c0)='./file0\x00', 0x120) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="2432d53cdd0aa6f7f80bf9c472d138c01d42875a672f8807d6fdedf6cb36a414ed86d90cde34627aeb8ca0a134f05122d6f7b7abc08d079d86ea2165efed1e36fb53429f4e627fc5fb25201b9e1008f5aae612a6717e871a1208c78fb67f2b7f0905006282da550fb26172fea919271f"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="a42f2884fa3cc58ac48b78590b1f9ca5f6ef925e7fda9e1f17e6a815660305488cb0c471628bc41e1ff7eb0b4e5991ae3ff8b082f6e1b6f0c32700d37400562d587d8074c4e88db5afd43e4513446812a599a3689f1eedbdd8460b0493fa9b2273632394004a23a676a912036e2bbd8a"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') symlink(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)='./file0\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$xdp(0x2c, 0x3, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x400, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)=@ipv6_delrule={0x6c, 0x21, 0x510, 0x70bd2c, 0x25dfdbfd, {0xa, 0x80, 0x20, 0x188, 0x80, 0x0, 0x0, 0x0, 0x8}, [@FIB_RULE_POLICY=@FRA_FWMARK={0x8, 0xa, 0xfffffffffffffff9}, @FRA_SRC={0x14, 0x2, @dev={0xfe, 0x80, [], 0x12}}, @FRA_DST={0x14, 0x1, @loopback}, @FRA_SRC={0x14, 0x2, @loopback}, @FIB_RULE_POLICY=@FRA_TABLE={0x8, 0xf, 0xff}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) 07:50:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:51 executing program 3: r0 = socket(0x1b, 0x2, 0xc) write(r0, &(0x7f00000001c0)="1f0000000a06f30501000b00024000000000010000799db8160e27b29a81e5", 0x1f) 07:50:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x80000, 0x0) ioctl$VIDIOC_EXPBUF(r1, 0xc0405610, &(0x7f0000000080)={0x3, 0x1, 0x1935, 0x4000, r2}) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000417e08)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x60}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}}}]}, 0x13c}}, 0x0) 07:50:51 executing program 5: r0 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x7f, 0x50000) getsockname$ax25(r1, &(0x7f00000000c0)={{0x3, @rose}, [@netrom, @netrom, @netrom, @bcast, @netrom, @bcast, @default, @netrom]}, &(0x7f0000000140)=0x48) connect$netrom(r0, &(0x7f0000000000)={{0x6, @rose}, [@remote, @rose, @default, @netrom, @rose, @rose, @rose, @null]}, 0x48) sendto$netrom(r0, 0x0, 0xfffffffffffffe37, 0x0, &(0x7f0000000180)={{0x6, @rose}, [@default, @remote, @rose, @remote, @bcast, @remote, @netrom, @null]}, 0xf) 07:50:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) getsockname(r0, &(0x7f00000002c0), &(0x7f0000000340)=0x80) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="ae4e43539be49fc5e1873f6354"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0xffffffffffffbeff, 0x0) setsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f0000000080)=0x32, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x30, r3, 0xc00, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x410c, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x10}, 0x20000084) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000100)) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="a97f5ff8222b925a19480d2e9341ccaa7acea7"]) 07:50:52 executing program 3: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x100, 0x0) ioctl$IMHOLD_L1(r0, 0x80044948, &(0x7f0000000140)=0x8) syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000040)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x0, 0x1c9c380}, 0x0) preadv(r1, &(0x7f00000017c0), 0x1a4, 0x0) 07:50:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000600)={'filter\x00', 0x0, 0x3, 0xcc, [], 0x1, &(0x7f00000004c0)=[{}], &(0x7f0000000500)=""/204}, &(0x7f0000000680)=0x78) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23083, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) r1 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x1, 0x40a000) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) mount$9p_fd(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='9p\x00', 0x1, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none='cache=none'}, {@dfltgid={'dfltgid', 0x3d, r2}}, {@access_user='access=user'}, {@uname={'uname', 0x3d, '\'em0bdevposix_acl_accesssystemmime_typenodevsecurity@'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x75, 0x33, 0x77, 0x7d, 0x7f, 0x31], 0x2d, [0x37, 0x62, 0x37, 0x61], 0x2d, [0x74, 0x31, 0x39, 0x38], 0x2d, [0x0, 0x63, 0x77, 0x37], 0x2d, [0x76, 0x0, 0x7f, 0x39, 0x73, 0x35, 0x61, 0x33]}}}]}}) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) connect$l2tp(r1, &(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r3, 0x80487436, &(0x7f0000000040)={0x1fffd}) [ 523.947276] 9pnet: Insufficient options for proto=fd 07:50:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffff0000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:52 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet6_buf(r0, 0x6, 0x13, &(0x7f0000c86000), &(0x7f0000000000)=0x284ea92c5e2cee3a) [ 523.992908] 9pnet: Insufficient options for proto=fd 07:50:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:52 executing program 3: r0 = socket$inet6(0xa, 0x4000000000003, 0x10000000088) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaa010000000000000086dd601bfc970008880400000000005859000000000000000000ff020000000000000000000000007bd90001000000008008"], 0x0) 07:50:52 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$l2tp(0x18, 0x1, 0x1) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r3, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) connect$l2tp(r1, &(0x7f0000000500)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {}, 0x4, 0x1}}, 0x2e) ioctl$FS_IOC_FSSETXATTR(r3, 0x80487436, &(0x7f0000000040)={0x1fffd}) 07:50:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffff7f, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_mount_image$nfs(&(0x7f0000000200)='nfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x7, &(0x7f0000000700)=[{&(0x7f0000000300), 0x0, 0x7fffffff}, {&(0x7f0000000340)="5637ba4db43d9810988c07c6316e673e4bd5848bd90210a798753cf30acd06a12558bd799158f05653780352b198fe2ecb4fac6a300b480696177242cf0d539c9250c8b7247763f7c82c1f882fc1198988f81f28dddbe914eb6d037c60537401737cf8b8b5a6c83a0ed0255be42e7f6c9e74fb572dfba131f6073368ed", 0x7d, 0x6}, {&(0x7f00000003c0)="395f176f6a8a86c9b5936a20fdbc8ff77b7d1a9012cd1c675d0323859e75864484d65f67011594c13dd61aa9238ca0c59cdb3f29408703f7d09439f7d19340b9cd08fe2172a5d85db422991590e3c9562753e24fc7a0c27c68fcc9848b8cee2751cda22020445d19500c6a3b38167a08ab64dcc929c07db41f4dc59f811b0f08dd82d8d9d8419081f4ceb050183bd680303b7cfc65746f3d6022675f0063a0ee66b729cf5f3bc9c9", 0xa8, 0x40}, {&(0x7f0000000480)="14686c9ded63b7652cab914865d983d061a3d175fae0ee7b2663b6e21a0db0fed0ef5f812d96a6fb17df9591935d5d50f7bfaf7ca032be3e9967272549a5b1891e3c68f7557d2a5f77d75bb5e510055511eb42fa26d3d390ccb12215c91694d47a98d6f468b73795f2f72f6b", 0x6c, 0x9}, {&(0x7f0000000500)="9acaba9fa39e595df7fbc4fd84b70e329f662e8c9c998708cb6ddc670454e7b9bc083ebcb250c334ab9710edf29eec9e5cc01f917dcc673163e810e4f1f36a8a4b145fb598f9f058f92a9f46ff9ebcafee52cbb4077926a9a79b307bf1c5f2025b22e6f9c6f6c72e938108326dc70c3f7bacb55c87ff06a8b6e58845", 0x7c, 0xfffffffffffff2c6}, {&(0x7f0000000580)="b963e2170f503128ae0dbeb9ba74babc2313a12eb7b6ec493b5a47121289979faa2fb158f509768aebdeda40605b78a3baed9d67c1ed97e088eb88f4c71563552b6b151e365f609e5825b9943c8c443a8d7fe3c3360a797590e1fba82fc25da5a2aa615040119d1881596d68a3e0e3684373dd803a0b3772600313f1e6f9ae7c80288a129a3d23ad5be99e", 0x8b, 0xb}, {&(0x7f0000000640)="79a34df21d03c5c213bb1c06267cc6c50963a586dec1f0712b66c6f3c92717404a4c0a0e5728e28ad424e7ec64eef3e08b620c837d58687bbcb8bc7f8ece806f241c5f05bdc58213088a222249364760cd5730ef338a5e1ab78effed99c1d43bd53a6be97ee454096a7f2015968c803cb098cd93b3e01c737ed8010a1745510a68ddf25148f36bd809c7dff5f5398ea9da1b93b672fcd8fc31604e3620c63fb93678e14f622d6f5b342f0cc9bcf6c41d98fd6a", 0xb3, 0x800}], 0x1000001, &(0x7f00000007c0)='ramfs\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:52 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xfffffbffffffffff, 0x1) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, 0x0) 07:50:52 executing program 4: gettid() r0 = getpid() kcmp(0x0, r0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000080), 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r3, 0x0, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x10) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000280)={&(0x7f0000000480)=""/196, 0x200000, 0x1800, 0x7}, 0x18) r4 = memfd_create(&(0x7f0000000080)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) memfd_create(&(0x7f0000000000)='/dev/loop#\x00', 0x4) setsockopt$TIPC_DEST_DROPPABLE(0xffffffffffffffff, 0x10f, 0x81, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000100)=0xbaaa) pwritev(r4, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x1081806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r4) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000380)={0x0, 0x700, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x1c, "7001e0f57c8cf6270b24e415e96042aae51d871554c11cd59cc80000000025bad6b39d778066f9d1ac8a570e3a42f70a7c0f30f66157a96aae15813f0dceb297", "a8a4cd0160ec941a3de45387daf7b1ac786d0e8a75e8904655faf6f2bc6cc487d93a61edb75c8d51c055faf7f4fdb16e0cdaa4276939a341033400", "2f18ffffffffffff4116893616105829576914e70bfeb59800f97c97644ab8a7"}) ioctl$PPPIOCGFLAGS(0xffffffffffffffff, 0x8004745a, &(0x7f0000000040)) 07:50:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffff8c, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:52 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='yeah\x00', 0x5) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x3, 0x31, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$VHOST_SET_VRING_KICK(r2, 0x4008af20, &(0x7f00000000c0)={0x2}) getsockopt$inet_tcp_buf(r1, 0x6, 0x1a, &(0x7f0000001200)=""/145, &(0x7f0000000040)=0x91) 07:50:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:52 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x2, 0x2) r1 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x0) ftruncate(r1, 0x1000000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8811000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="34010000", @ANYRES16=r2, @ANYBLOB="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"], 0x134}, 0x1, 0x0, 0x0, 0x40}, 0x2000c000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") [ 524.350910] Unknown ioctl 1074310944 07:50:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xfffffff6, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 524.387342] Unknown ioctl 1074310944 07:50:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:53 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) listen(r0, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3174a070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$rose(0xb, 0x5, 0x0) ioctl$SIOCRSGCAUSE(r3, 0x89e1, &(0x7f0000000040)) 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086610, &(0x7f0000000300)=0x1) ioctl$sock_ifreq(r0, 0x891c, &(0x7f0000000200)={'bond_slave_1\x00', @ifru_addrs=@in={0x2, 0x4e24, @loopback}}) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$getown(r0, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:53 executing program 3: perf_event_open(&(0x7f0000001e40)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x2, 0x11) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8000, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x5, 0xffff, 0x6}, &(0x7f0000000080)=0x10) r3 = socket$pptp(0x18, 0x1, 0x2) bind$pptp(r3, &(0x7f0000bf4fe0)={0x18, 0x2, {0x0, @dev}}, 0x1e) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x6, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000280)="ce643d25646205119f3208fe42c80d84c503b999fa0ca8715466e0969f836486ab756d0a90e81c9a8111575eb565a8fbde060dde1f36ec147ff9df8ccc1ca6b4de5595ed4667b2f90a34299482459605b3f95e4c4c676f91b0ad5e6abe23378974c0804c9571c3de54efbd3ce8f5952847de2595a51fd14717bcfe5895c04a11bf949181f9b712fadaf3ecdbe58f9dff61de4db306f3448b61009012d3f0c531608140a1de1303ed0f6ce4848833ed087765c25f8151168af32193dbe9d5cc4a88d01f92be0b853dfdb3a1e2face45d44502d564ed8a0e500f71a3ce", 0xdc, 0x10001}], 0x80000, &(0x7f0000000400)={[{@rodir='rodir'}, {@uni_xlate='uni_xlate=1'}, {@utf8='utf8=1'}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/usbmon#\x00'}}, {@appraise='appraise'}, {@appraise='appraise'}, {@context={'context', 0x3d, 'root'}}]}) bind$pptp(r3, &(0x7f0000000000)={0x18, 0x2, {0x0, @remote}}, 0x1e) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000000c0)={r2, 0xad}, &(0x7f0000000180)=0x8) setsockopt$sock_attach_bpf(r0, 0x29, 0x19, &(0x7f0000000380), 0x4) sendmsg$kcm(r0, &(0x7f00000001c0)={&(0x7f0000000100)=@in6={0xa, 0x4e22, 0x0, @loopback}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000002b80)={&(0x7f00000005c0)=@in6={0xa, 0x4e21, 0x0, @local}, 0x80, 0x0}, 0x0) recvmsg(r0, &(0x7f00000029c0)={0x0, 0x0, 0x0}, 0x2061) 07:50:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xedc000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 524.554643] print_req_error: 63 callbacks suppressed [ 524.554654] print_req_error: I/O error, dev loop0, sector 0 flags 80700 [ 524.574377] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.580844] buffer_io_error: 62 callbacks suppressed [ 524.580852] Buffer I/O error on dev loop0, logical block 0, async page read 07:50:53 executing program 5: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = syz_open_dev$vivid(&(0x7f0000000380)='/dev/video#\x00', 0x2, 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/snapshot\x00', 0x2, 0x0) tee(r2, r3, 0x7, 0x4) mount$9p_xen(&(0x7f0000000040)='@eth0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=xen,privp\':,func=KEXEC_INITRAMFS_CHECK,defcontext=unconfined_u,euid<\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=r0, @ANYBLOB="0008925d2e54435a", @ANYRESDEC=r1, @ANYBLOB=',dont_hash,\x00']) r4 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r5 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x20011, r5, 0x0) mount$9p_tcp(&(0x7f0000000400)='127.0.0.1\x00', &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='9p\x00', 0x20000, &(0x7f00000004c0)={'trans=tcp,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@fscache='fscache'}, {@nodevmap='nodevmap'}, {@cache_loose='cache=loose'}, {@access_user='access=user'}, {@privport='privport'}, {@privport='privport'}, {@aname={'aname', 0x3d, 'mime_type-GPL-@'}}], [{@dont_hash='dont_hash'}, {@fowner_eq={'fowner', 0x3d, r0}}, {@uid_lt={'uid<', r1}}, {@subj_type={'subj_type', 0x3d, 'user'}}]}}) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000000)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) ioctl$BINDER_THREAD_EXIT(r4, 0x40046208, 0x0) [ 524.629921] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.636405] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.651420] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.657890] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.667357] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.673776] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.689675] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.696118] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.704184] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.710652] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.744929] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.751103] binder: release 23862:23865 transaction 20 out, still active [ 524.751373] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.763591] binder: undelivered TRANSACTION_COMPLETE [ 524.776049] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.776170] binder_alloc: binder_alloc_mmap_handler: 23862 20003000-20004000 already mapped failed -16 [ 524.782484] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.787100] print_req_error: I/O error, dev loop0, sector 0 flags 0 [ 524.792484] binder: BINDER_SET_CONTEXT_MGR already set [ 524.799127] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.800527] Buffer I/O error on dev loop0, logical block 0, async page read [ 524.824096] ldm_validate_partition_table(): Disk read failed. [ 524.825534] binder: 23862:23869 ioctl 40046207 0 returned -16 [ 524.843947] binder_alloc: 23862: binder_alloc_buf, no vma [ 524.859420] Dev loop0: unable to read RDB block 0 [ 524.874852] loop0: unable to read partition table [ 524.878027] binder: 23862:23865 transaction failed 29189/-3, size 0-0 line 3035 [ 524.890311] binder: send failed reply for transaction 20, target dead [ 524.916534] binder: undelivered TRANSACTION_ERROR: 29189 [ 524.933630] loop_reread_partitions: partition scan of loop0 (pàõ|Œö' $äé`Bªå‡TÁÕœÈ) failed (rc=-5) 07:50:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x4000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:53 executing program 3: mkdir(&(0x7f0000000100)='./file0\x00', 0x120) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x100000, &(0x7f0000000080)=ANY=[]) r0 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x7f, 0x8000) epoll_wait(r0, &(0x7f0000000200)=[{}, {}, {}, {}, {}, {}], 0x6, 0x3) 07:50:53 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x40000101, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0xfffffbfffff3ffa7, &(0x7f0000000140)) 07:50:53 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x23c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f00000001c0)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dlm-monitor\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f0000000280)=0x7, 0x4) getpgrp(r1) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000100)={0x0, 0x0, 'client0\x00', 0x0, "6929a4c6adbea9af", "5b0460ecda35f8072167e30057faf79edb135715028e1b534e229c24e53a7a1c"}) r3 = gettid() ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r2, 0xc1105518, &(0x7f0000000480)={{0x7, 0x3, 0x8, 0x2d56, 'syz1\x00', 0x3}, 0x0, 0x20, 0x59c, r3, 0x4, 0xffff, 'syz1\x00', &(0x7f0000000340)=['/dev/snd/seq\x00', '/dev/dlm-monitor\x00', '!}ppp0trusted#posix_acl_access-6md5sumvmnet1&[\x00', 'client0\x00'], 0x55, [], [0x5, 0x9cc3, 0x9e, 0x5]}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x15) 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x101000, 0x0) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000002c0)=0x6, 0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) close(r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x20000000200) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, 0x0, 0x1c3) 07:50:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 525.077224] __loop_clr_fd: partition scan of loop0 failed (rc=-22) 07:50:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x100000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:53 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f000001bfc8)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@bridge_setlink={0x28, 0x13, 0xa29, 0x0, 0x0, {0x7, 0x0, 0x0, r1}, [@IFLA_AF_SPEC={0x8, 0x1a, [{0x4}]}]}, 0x28}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0x7, 0x10000) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f00000002c0)) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="89927df4dc2a92a523f40fafa2122aedb712af64213eeaac3bc81bec0752339931d2c12d74270a453f03e58636e652787f9c642da30358dec740d20b78c8590442e49809069aa13f9abf1fe082ee899c906a099a9f0e951195e3d1c228277ccaa2ce7127fe8520cb0fe3cce33335b580a27e0908dce8abee3b1336feda76362638a51b54b616"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) setxattr$security_smack_transmute(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x2) 07:50:53 executing program 5: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ubi_ctrl\x00', 0x200, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$llc(0x1a, 0x0, 0x0) connect$llc(r1, &(0x7f0000000000)={0x1a, 0x0, 0x200, 0x0, 0x0, 0x0, @dev}, 0x10) r2 = accept(r1, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000180)={'TPROXY\x00'}, &(0x7f0000000500)=0x1e) r3 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001400)={0x0}, &(0x7f0000001440)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001500)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000001480)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000001600)={0x0}, &(0x7f0000001640)=0xc) r8 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000003900)={0x0, 0x0}, &(0x7f0000003940)=0xc) fstat(r3, &(0x7f0000003980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000003a00)=0x0) fstat(r3, &(0x7f0000003a40)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r2, &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003b40)={0x0}, &(0x7f0000003b80)=0xc) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, &(0x7f0000003ac0)=0x80000001) getresuid(&(0x7f0000003bc0), &(0x7f0000003c00), &(0x7f0000003c40)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000003c80)={0x0, 0x0, 0x0}, &(0x7f0000003cc0)=0xc) r17 = getpgid(0xffffffffffffffff) getresuid(&(0x7f0000003d00), &(0x7f0000003d40)=0x0, &(0x7f0000003d80)) stat(&(0x7f0000003dc0)='./file0\x00', &(0x7f0000003e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r0, &(0x7f0000003f80)={0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f00000010c0)={0x1d0, 0x3d, 0x10, 0x70bd27, 0x25dfdbfb, "", [@nested={0x118, 0x80, [@generic="a4559fe9a7d5e75c96b6844cf8eaf4c257694eaeb85f97bfa8732ed16133497936dd4860af6ed3506e98a09ced0e3ec6d3a38e1215c6323049d48063fef64b7f23a1e93635fe3e9274fd8b9160e3b91530a3d664338135e748bc02b144a2c1e4865e062f2c78283c3abb027d95548b872fe2d26c14ec07ad3ba148147daf5d85b25cc1b273608fbd4178df1383", @typed={0x14, 0x7d, @str='/dev/dri/card#\x00'}, @generic="88e752544f26f70ef80bbf908fc93626c7b18ac062d90859d7e1e32546dd6a327580fc40437919e0d0eb21fd6dfb1d4d26336fbb2f962b4a5efbb819534f9b47c07847f866e7dac2d2b3a90546704772131a51dce56bf7c7dd8ea13124b1fd82464ba4804488d2c262622f", @typed={0x8, 0x30, @binary="b254"}]}, @generic="cb96979d90f829ad93204ad73d06cf953b33a43f9f518bae6f4a2d02af36e07c0ede82439c8cc36886e333c63a98a473f58674a4639ff6c2a6b28d4fc6ab75063726814022b9315aacb79ff817d9da40968a2f71ebfe436c1ed293c882ac80eee31e40a27ce41de85428fdc39f7484cad8a8e6d3465426278ca610fe53e553df9c93d2880bff10c86264ea49f3dcf8643a80762cad4d7459dfbb34db67bb76187a4abba6c6"]}, 0x1d0}, {&(0x7f00000012c0)={0x11c, 0x1c, 0x20, 0x70bd28, 0x25dfdbfb, "", [@nested={0x104, 0x47, [@generic="d6fba4f0b300243757dc996ace477a415f839ee0910d99149e9e376a8b4b414054162ea06f8e8f5f53aec4bb56ef1e2d9b3b8f7e171fb94a4ed56434de93791e0a7224556829285e5e00df7ae72a7c710648182d1c00bfe60eba4baa5657df475d7f9ef39f4ea6ba6763db867055bafadeb6a07d1f7698e64f4a082c386d815d63cddd068c1ba3251c0321eda6d03872ff3efd5e434d318de654afdc28321b533f51b6e03e6af25bae28cb8cd5b53bb7fb227d6737444a", @typed={0x14, 0x6a, @ipv6=@mcast1}, @typed={0x8, 0x29, @fd=r2}, @generic="4c833c79ddf2f0363e651a3b0a93349f54b506be235c6f54f91af08055ead34bb74e107eea0267377ee7ebea0d"]}, @typed={0x8, 0x7f, @fd=r2}]}, 0x11c}, {&(0x7f0000000040)={0x14, 0x11, 0x700, 0x70bd2b, 0x25dfdbfe, "", [@typed={0x4, 0x8d}]}, 0x14}, {&(0x7f0000001680)={0x2228, 0x18, 0x4, 0x70bd26, 0x25dfdbfb, "", [@generic="c09c28a17056c5e7ba3cb9de25764cb8609f301b10c3f326437233e6807882319b75e59a4a3bacecae48d2b8ea5b098007295678f56752fd5c77f4124df3fb6b6dfeb6c8364667da5ff4766574a5a47e9dafcefca1d713565f1208af2a32c195526d02d2783ee1ee06247a29313e6fc6e0062d07f12433fe0da5ab8f1bb9f251b4174bc68f827d8b1f9a8867f4b77bf52877215e0e08d22e9de78b8117bd955782a24045c47cf7dd90f5dab4acf49e2256d21129f4de8ee63ecf6166b452d12de3d8", @typed={0x8, 0x7b, @pid=r5}, @generic="13efd0cca93282ea4d27086c40949b727950addd441ac8f23c95cb673e9f25da19c422a688fbaff7355807f4652cdc4e75c1c160f94df030b602b6fb3da9152d4a6d3944baaefa5eb28fb3743b97a722a12a0545eef9ff67429d67005425eb879826e2a1c7cbcc87dceff1121dc01850d3972615273725e1c28970e76bbcbed19a9e6eb50a5c23beadb6f1500caad0b534a114bc39", @nested={0x1020, 0x74, [@typed={0x14, 0x2a, @str='/dev/dri/card#\x00'}, @typed={0x8, 0x66, @ipv4=@broadcast}, @generic="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"]}, @typed={0x8, 0x1a, @uid=r6}, @typed={0x8, 0x7e, @ipv4=@loopback}, @typed={0x14, 0x3f, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, @nested={0x1020, 0x90, [@typed={0x14, 0x9, @ipv6=@dev={0xfe, 0x80, [], 0x23}}, @typed={0x8, 0x20, @u32=0x4989795f}, @generic="7864d42a2b6f1cd93b68304a2f8f2551d52888c3ad03bc23bd2888a32977d05bc40e6e570629d098eaa319d47aa2cc82ea3380c92e29b58ebf1e5cb451b0b5ad2df3ab22b8506b6f08aeb8c3c2986d14f6533552bff3862cf23f7db55e7e57b63101427d19c0758eb0dae535f27af7362bbc3588cda240e1ecccc744d53074db370e205e302dd1a21ba564dbf30a7b22e6edad7c92d910ae3eda10e9e7e87aa40503eade2d4ad45d0cd931d67766cb25561319b84bbc797f49a4eda006b8c82b1ffd98fe91a7203d919b939945ec3dca0fbedc1240908032b6c30934685fb9c3fe261ba482ce577d3e3ecd05b9ba25bb229d6f07c274be7afc94c342ce70936b0ff6719d52037c0bdab63786bc3ce894141b89508c92b2694eef1fc80bc28f741a007b241576b7dc2b11282fc40d06d5e289ab12453c472adae868a0ee4818d329631ae1f4ae3449fc402fe9a690f16847d906d23f135184d7ae512b645f991b7ce14082ecd4ba107ba5c71aa50794bcf93aff630be816f7a4ceabe02399aa81259aea312754750fe9a2556ee8d856fc2befd50ad01e535bd6ab3e1403f6658e9275ea66833599743c8fbc570dfd078b493c6a32dd1553628aac263cae5c9c6c8876be53a49760f1a99fd570ef2687c6acfa39bbc32d00558ab5d07b0582a9f0f58e1ac4bc407201d35305cecfb15eae7a7704eb8f787e47adfc71f7e78802bb166fe0c1c41065157ff178dc787be227eca96d0de18565a4357bd3e594179734966b2252af44272244d566b55c84e2d01838ca908f8433d301e4e54467f8271765fdbc8779aea1a78a352bdf743f80a5e3a1a345b292b888e6166638f18ebf69cd1c0332425bec8dec08f981ba8ab06e4305a4ee85a9f878380448f191766358cb6792068cdc80009abea32683f01c94b5a564185bdde2352e4656a61e9d8584efd7128e5b3c8d5b098f6f01ad710b5ce1c8c8a95909618cb3ba451ad565b4388c8cba83f252a3033d70e118b6a592c728bdff8bf6e4794dbe71e3aba06402bed4cd5969e995d01bfbee90c48680a48fdda20bac9dcdefb0dce33cecb64a5663b16556323663d58b20ded2e95eb3ad58ce2f272c7d3d90afba6d917f9541a7022485a7ffb401c2f73fc91518d1d2e2a7f3737d63e23077dee64e0ace151648e1f733dd4d5ee6017112cee99fff8db44ab5d4047ffc37299d3b4e77fa4f07ab909b553ff5482e9e923f1d9d2375da22d485566c90c4f4c43a7c0bd104444affcb6fbf29ba643d85248961330cfe984b46e27779d742d3075ae8025e916e9bc445f8cf8758c78f27df755d30fd371006cd5df6a951a1acc0650a5bbad460478c883d224bb57e141add317bd4eb226921ad738cefc66b084a47d1e85105b26127b76113ef27df6bf463ef13dfcb83f7602eaeaad72a883cf0a7c73a0394baeb0f3704c7088fe137412b40993a4aeabed5a0a01c98334789c66037471a8145fa1f35cf8c83ccc3dd2e3a4e90dd81a61c0853fc5e406b2db4574dac10451a9b7ac2d7360e373aa355314a31eb1cd98073c4c358fb1f6cc5dd2eae6e84c6d1270148cbb99595c890614da98eb32af075322e973a0962217aaed3d40d1302313b0d0fb83fa7a91bd5ec160910e3c12e89261b17033a4fb93e971186096fa69b0526afb0439ffef385e37a919013e2d2d0ef40a7e79b1439eb7f180df5dc96218bf679d4e96128ecad8e3aad6e03dc755f11b5d08de110d15e768c52e17a6d656186c2ed1505927ca2ec08e405740ed4f6cef6dc5dc52c4a04c2a122a945bafe69097b5005c03832661697fa36373bb106c647f100cd71629843c3f5e585b30faf9ef7612c5a9f8a86eb8c03d0195fd126d8c148f3cf1779b13d2becab313b7ee6a9dbdd2055c72900fdd0523b3dd5cb9b400a9f7a41bad50793060e2d6ed7d324d6d77629af2d55d09b684e8d406d2585d45a16fae1c11306201007162033c0321c34531ce10917223da5129d232bd3031eb4032bbd0a8c4b4ccafd571ab2d644d208124ae087aea040092355f30fa529b9706485471efa2aae80b6df080d32da7c80dcfd27905d688911582a92000cfcadcafe2a55f2ece072c9b6b9400820bf5edd258fb79c750ee39a16b415866bfeadcca4648fdcd44faa47f1e764067d6fba14eeace41ef3da2ba11680d943f10e6fd6d946af12dadf277ba256f10b9cf8934e85134b82ef77b320f571ba71d679d14c6bee1b210b93d0335eec221f12334d90235ce2f6f7e4a5a01a008bfdbe7547d78987f8804f65f1a5988c3fd290b7ab770f6783d09c0d49be46a768b8c292f9767893c2e274df96fb9f96a7c1b31fa50a2aa37dad85f0345a5f97f4a2d9dd3a7030b15d4c37cb7a8a5223e33dc74ec5f5ea1163f7aee27d97fce874f4334a0996600d6a4d4c8bceef77a81bc536a771842afa1a10ae5c78570f6a0af983640813bae65f480b0b3b5e1f6b2cc43c190c660aa6d471c7d8f77bd99a7a6e9147db75e05fdf71da0d1f6aa3865ab18b92ad5e0f44638262b8ca3cd705ca36d76cb062fc8ac01e0972f33896f317fbcee88843bf3b6e9bbf6919d4eaa632666aaeae63dc67241ce0660305026fde20d25d3bbf61708097c4f89cb539d3fbf615e0292aede9882dfbb986c84a60bb8a66c8f197dc4ac02be666fdebdccfc8f0d956ff9c78dcd9e569e0d03ea4cc5b7768608a5ba3d2334d695f6b99ccb9f579e88be1edfdf9bbf75fc21b210690d3728882b817918679874d359cccc690f8aed90758656f2bcc39fe41e88bc56ac048180a217fc0103bc01de8f41d7cb815414a0a01887f0bbc2d16cf6d806e309dcb2ba0985c309bef766b49b14efc439700c85acd0f92c7b061bd13a3f4d3f44d51b2644fedc0c1e68d111b1643c0969500da450312e357625ead1138801ce012fc1053ec8c5f231a1e8693844b6329f323f77cb3876e152d5b7c3132d08d2aae5326c88bd3f39303992ac4001aba18f5491e8029e023f04d55e76e3f8d9c9dd97866d0f518d6d2077b08265b9d4923a3ac99d69ecbde8c5c9b0b0ee1a041cddb65e96ca484b0c35ec85c1c00c5af5f3d31f039acf54abef43ee03993ca86eed807ac361b054ae0f0b3dc04633622928e91e7d05a429f8a06c9ed3eda345906638866847f67ccf2fc684647002e332d2382db1281991282f3b09fb4e393b3247ac861f0142c2cfdb9411e4b2acc1862d277a86611c90d8ee82642e6d40471df805e4e8d4fb821f6be5e433aab9fdd47e8809bbbfab0fb2a0f3319e00a8eebdc5bcba74bc92d0dfe6710bb256848ea26d996611967a772bf6c262ac1f1a4b790ee2f3c03e3bd2d4386f43473ad0c6b0898409b013e6c32d205dea74a2fa4a014c981dcccde39248773af0db2aa179267d3b0e41632f1a297f011eefb5ff290601e7295221a5e064c271c0425e3cc467433451397cf80ebd5e03f2e602203348d7f108f2cf90d65ca56b8367deecc9d81e4ede8d66109eed20deb6c62cdad96dd1df55ad968378c5fb5ed2feb29b60422f73cdf6521f743a5d866491786a5fb8ea58be3656e246c45cf5c100b4eaf4da99d635442dd1225e7f418043a6d305debd45bfa607ea2508716355bdfb29b956a8e5a66a7f3bfe3ed2fbd9f2bc670099d90018bbc3bbac037ea2d1b0dfe8647011da6d6a8d44939c92b7de028a6d77988f10436fa7598436235d86fdb10eee74e90b68a0a137585dea44308d7688001b9594ba4ebeffe2e186016f9be8eef3b3514a3c6dfdfc19087e520c04632c6f7a563e404d1a39114bdb577a47246c21c848316ef48aa897333a8a34e37f671f6f5c8590e9f6ac214ee6f0b032f7adc1b2ad79d90b80d1cfeb31f3e26760b8b6977f94abdddef37dbf64d1512c8ff16d13a8ab6cbf8a446c3e9fbc1fc118b6b83df87e0a884e9d2bba26e358249dc350439c096c58f5ab8e36084b095a3d5d49d25b14a996f4828f2169ad01d67718fc3eb7dbc2c54a21d2c5750037336140ca1f8f2f4dfe50ec0b2e0567605a05af99e2c206b130c564e3cb4e789e1fea1b2aac1ca7e96ebd40046f20b4ac80af5be394cff9a6b47c483262b8978be43e081cd68addf44d9c2346c433ce77eb37645c8e939f5069f9ceb283d4c79f7034c79cb9701bcef900cecbff798a046298f1dedd03cc5fd6b78165081e3df389617fe530ab3c01ad306d7ccfa28dc17fc4461798f35645b4c0b9c9519cd165533d31bf1e5acb36a6ef132a471622df0d18d9ef23d28de61f0ce92cfcb073c1172ba9077f0ad1fd8e657aa93ea0600e6dfddd2dfb6259a787804d5a79be19d95a54d11c383494fc3be9dc0833a19bb2d846f735582139920fa7836fa00010732eb15086de0e1d795948b2f7de2457fef9dec182e9835d25901dd52658a469f8d8b45558743b803d08230c2940b10f7942faeee5b48241ec174fdfae83b0b1085363b53a90ea8f9fae9ea140a3c61e55771df76eb5bc314863799a6229b01dc13442480e358ebc4b142595d22136a6786f58a947be93dd864c4d945b6eb7578c9ec0008a5dfd573bf7303bb78865a53bb4984fe4de3c13dca2e488bb6713d30b4807d451ad3dada4f4a4b3ab5f530c7d4e3220f5106887293492f82b9899223732398844456212cb00482e34f8442acae5735d614fa069d678270cbde3b8e5538dc50d4c7a810333ae23b19c417a6e5cc1081693c9a21da07d0db9c74a37840323910d8eb4ecdd0771032542c481514cf3201e642f797adcf3ada4e1879a341907a0870f7b679dd5643d498f4d4c0c9e969c14a8f48da7e932b3a142318bca69b6a034c130c92be8e099cf010820b2978f6c5fe3e26cad44d9d07176c5b40d51b6b7d806ede50a2f994f74b867911067d6d3ec3ad04c4fed1079095110a9c4c6627a734564567d4c339c42038c1363e82beaa3a54a47940bb84f72ae702ff18979cca5267fac205178d63b5cff259bce42ac6452f54c8e179eb357377026e28ca215deea652c27803a036ef7a512ad84c02408555801b1f98281ad36533647b42c55688e1c7bb21706d5a3cc50618a6517c3eca64fd0c6b80467fd033912dfc18a02b734ee84e8b48f9027f0dd6d06911bfd70216132d2ec146a20120348426868ac279d6f016709327e56d391f798a206e4ce8271c51f1555b187b33d671566e367b84cdd8979d3d30ecbd4e3cd4e92a0add59cf26a6b3b8074096f012893e148dfe32de20fd6068d9cc85f9b1da2f720784ac19a4b0aaa4d7e75dd6cd189e92c2c3c6076507948001ca24a12101317b1516037d7b642948c134ac5b44d1bb74bd115448fc9e742aa598016748e757897612b6ad2a0e493cb1338550d0cf6c0009aaa99e1b197a23d2495886e269f51e55b5d9d8e42a273cdce6ecdaf0c9f3c44d0ae6652af3db939be49359bf8720c4c7c4a36ba205864fb9f810ae0337cc26cec2589d3ed75bb6cb8035c6645801e03baf7d79d65be2d5787cbb09a0f9438caa441b593740dd334329f28662e0337ebb60d674dd8d7df303f3c3a9c874b1667142139037508bd49174dc93d9bc3d67ef9fb81fefb29f6d18cc6060c67c06223be3c8a79cf71ec3eb5b6ddf062659711673412a76cdcd9a4328e5fe9df36baa7a777c63928106ed786fdc3197960108530c520ee1e49ac0bb15ed3d5dc79c9b7f6129100f39f232e5b1452f676d49b23abb507a12d0ec1132bc045da71d02c307f78195fecd08de34fdbafe62d74dda3fcc57ae6219ea82b4685a62232ed01dc68a0b1f3fb9ee6100fd1eae"]}, @generic="b26f875f8bde6aae5f8ac6cc9559d71ebd8f192b9d2ea71d13b36ec80307bf1bf7ec14f2ad66205147ec3ff837358c23233d2a56cf3b4f5e820b67f60d33784646cd30999b7557d8064e168f", @typed={0x8, 0x6f, @pid=r7}]}, 0x2228}], 0x4, &(0x7f0000003e80)=[@cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}, @rights={0x18, 0x1, 0x1, [r3]}, @cred={0x20, 0x1, 0x2, r17, r18, r19}, @rights={0x30, 0x1, 0x1, [r3, r0, r1, r0, r2, r0, r3, r4]}, @rights={0x20, 0x1, 0x1, [r0, r0, r3]}], 0xe8, 0x1}, 0x20000001) pread64(r3, &(0x7f0000000080)=""/4096, 0x20001080, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x44014) timer_create(0x0, &(0x7f0000000440)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(0x0, 0x15) 07:50:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x200000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x400000, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f00000002c0)=0x7fffffff, 0x4) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x10) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="827c8261cf505204b02331bb48c33055f8e49058e8caeee7bea9d9b6acb60d7098e51bff03000035221e5ccdddb733cf42ee6d37a3e4605b5de51378b74d3845e416b1c513ce449d3fe26045913ed22d72bb8f2efa37fcdef2673d0b21000047956be608cbcba838a6b47d1c120aa71cc9d80a6e234b406b5f27c73a2680b04742fd8bc7f75628000000000000000070af9a5fc116c13e9edda3ac93e7040520184d4b0348cc4100de2fa1d5709c8c0aaf920fffe58e7b78420e5f2ba895566fd70fde8ee942d207aa1957c1b889db1cde5e5898f2d0e78fcebcc3f1cac42529f54b065e40e5a93180dd43d64b"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:53 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x1000001000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x406880, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000040)) close(r0) r2 = inotify_init() mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 07:50:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x900000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000400)={{{@in6=@local, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xe8) connect(r0, &(0x7f0000000640)=@xdp={0x2c, 0x2, r3, 0x2b}, 0x80) r4 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)=0xffffffff, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000780)={0x0, 0x8ac}, &(0x7f00000007c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000800)={r5, @in={{0x2, 0x4e23, @loopback}}, 0x40, 0x1, 0x0, 0xffff, 0x100000001}, &(0x7f00000008c0)=0x98) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000180)=0x0) r7 = syz_open_procfs(r6, &(0x7f00000001c0)='oom_adj\x00') ioctl$FS_IOC_FSGETXATTR(r7, 0xc0c0583b, &(0x7f0000000040)={0x0, 0x0, 0x108}) r8 = msgget$private(0x0, 0x200) timer_create(0x7, &(0x7f0000000100)={0x0, 0x18, 0x1, @thr={&(0x7f0000000300)="92df825eb881229ee5c3a172ecf37dad1ac6a2cdf24272e41f553acefd5214621929f0a6f964f8b1c5db8b20ba23a3d69c2d87341cd17515410c27c491381e9d14a841c34c3ed05553b6a82403841b84ec3fc603a3accdb0dda1e447a0623c13a094c873bc2fab5c95cda4b52f6f8b4679de0f127b2b2bc431a15d7a06ddbf520b4b4b4ee3556b8dd9935722a345db7a6da36f3e2caa333976f300b46278d30ca166233c097daf06dfd8060f9579a3f4aa86cf203cd339073243b583b09f5e9e065bbcc052484552f0477ee2847cd700b5ba4f60575115d68c72a4240c8780b50fbfa59f9b885b16990bb9", &(0x7f0000000000)="e6fa35db58685dec15111f6ae4135f61aa0673646b93360008"}}, &(0x7f00000006c0)=0x0) timer_gettime(r9, &(0x7f0000000700)) msgctl$IPC_INFO(r8, 0x3, &(0x7f0000000500)=""/253) ioctl$KVM_SET_IRQCHIP(r7, 0x8208ae63, &(0x7f0000000200)={0x0, 0x0, @pic={0x4a, 0x2, 0xdcde, 0x6, 0x6, 0x7, 0x9, 0x1, 0x5, 0x3, 0x2, 0x0, 0x80000000, 0x0, 0x100, 0x2}}) ioctl$EXT4_IOC_GROUP_EXTEND(r4, 0x40086607, &(0x7f0000000080)=0x18000000) 07:50:54 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x20000000000003, 0x0) openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x280800) ioctl$VIDIOC_G_EXT_CTRLS(r0, 0xc0305602, &(0x7f00000000c0)={0x0, 0x0, 0x0, [], 0x0}) 07:50:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:54 executing program 3: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000040)=[0x4, 0x1c3c0000]) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x13, &(0x7f0000000000), 0x4) 07:50:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x1000000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:54 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x20000000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x23, 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x0, 0x0, [], 0x5, &(0x7f0000000040)=[{}, {}], 0x0, [{}, {}, {}, {}, {}]}, 0xc8) 07:50:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:54 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000ac0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(cast6)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000200)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x7fffef4a}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3542, 0x800) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000100)={{{@in6=@dev, @in6=@empty}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f0000000300)=0xe8) getsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000440)={0x0, 0x9}, &(0x7f0000000480)=0x8) getpeername$inet(r2, &(0x7f0000000600)={0x2, 0x0, @dev}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f00000004c0)={r3, 0xf4, "010b509c6d7674b4cd02fb03fe4f3f34843eed83179a942fdefeafd00c196e9c9518a2eb599caaffee716963f8febab9f69cb4cc07bd43791e8f13ec7e5882d6da967e1e9f15fbccf1ae5f56875c9385c6ecc724cc1da65a240c1115d2af1add24c6e4080077205d53f7136192e5f9bf0a06c0984a7b0bbb296dad2b82907d0b70753016a2b974bda9cf050a46c1bd4a4a9b238e54e6a40312d01a803e7e6bdc65f964b6adebe5e4b17f77cb9a94dff403f51d9497a0b3923e0f3eaa6b8244d038f69961412c8cad6de81d3a1afdfd70020d8906e11d1b0e77fbc43da3abdefe57c0ec3858ec0cba8f0f632e7b71e874e922778e"}, &(0x7f00000005c0)=0xfc) 07:50:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = open$dir(&(0x7f0000000200)='./file1\x00', 0x2000, 0x1) statx(r1, &(0x7f00000002c0)='./file0\x00', 0x1800, 0x8, &(0x7f0000000300)) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="fc2a8d1714e25476c2f572097aa301f8b9ba175c07935e4364433380973761f22820405f92eb9a7d04ae985c87e3f219853e1241e9a026867b99ebbf7a4b99c344c9c34f62589de06ee0ba02a5e5dffbb17b5bd2"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 526.196296] net_ratelimit: 22 callbacks suppressed [ 526.196303] protocol 88fb is buggy, dev hsr_slave_0 [ 526.206431] protocol 88fb is buggy, dev hsr_slave_1 07:50:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2000000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:54 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000000140)=""/19, 0x28e) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in=@local, @in=@multicast2}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6}}, &(0x7f0000000000)=0xe8) 07:50:54 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$hfs(&(0x7f0000000080)='hfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2c18d53e201c064d"]) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r3, 0xc06864a1, &(0x7f00000001c0)={&(0x7f0000000040)=[0x0, 0x8, 0x4], 0x3, 0x0, 0x1, 0x800, 0xfff, 0x20, {0x400, 0x7f, 0x7, 0xfec, 0xe43a, 0x10001, 0x56, 0x369, 0x4be, 0x0, 0x80, 0x8, 0x1, 0x0, "d157c41795e11ddec9b61c2e2b81676476f9ec003d410fa100000000001700"}}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000980)=0x0) r5 = getuid() stat(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000a80)={0x0, 0x0}) r8 = geteuid() getgroups(0x6, &(0x7f0000000ac0)=[0x0, 0xee01, 0xee01, 0xee00, 0x0, 0xee00]) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000b00)=0x0) r11 = getuid() stat(&(0x7f0000000b40)='./file0\x00', &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000f00)=0x0) r14 = getuid() getresgid(&(0x7f0000000f40), &(0x7f0000000f80), &(0x7f0000000fc0)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001040)={0xffffffffffffffff, r0, 0x0, 0x9, &(0x7f0000001000)='/dev/ppp\x00'}, 0x30) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001080)={0x0, 0x0}, &(0x7f00000010c0)=0xc) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001100)={0x0, 0x0, 0x0}, &(0x7f0000001140)=0xc) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001180)=0x0) r20 = geteuid() r21 = getgid() ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000001440)=0x0) fstat(r3, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000001580)=0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000015c0)={{{@in=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f00000016c0)=0xe8) fstat(r2, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r28 = gettid() getresuid(&(0x7f00000018c0), &(0x7f0000001900)=0x0, &(0x7f0000001940)) r30 = getgid() r31 = getpgrp(0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000001980)={{{@in6=@initdev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000001a80)=0xe8) fstat(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r3, &(0x7f0000001c00)=[{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000000340)=[{&(0x7f00000002c0)="2bf81e53768180692b67f3eaa7739cd0590cba68b3bf6be0523512d4d77c40c9e2955c1d58cffb0321f11e62fa51da4464b9e25f9f2cda59b6c177091dc707d19d22e258e1fd2c96e714fedb55e7e039f4f61cd28edc7af0551243b19a1de4d723a7962211a73e6f8d6e564aea611314f137372feda235b4", 0x78}], 0x1, 0x0, 0x0, 0x20000000}, {&(0x7f0000000380)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000400)="927d113c7b6f461d2870ed553adb17e186fd8bbe0ddc80cc4800c27102772c00aa50420d8ec92e284cf3bfb2a5adb25653396c0ecca92f1d6657d74935e77f312bbb", 0x42}, {&(0x7f0000000480)="c0b4e5be48dc076044575ea7f8580645d67c1f310e06e060d14e2b543eec6e18e35bbc5643ac328a065f535cbebb059c28c0b21e554fe99d65ae", 0x3a}, {&(0x7f00000004c0)="d5c1c6c208a6f10cafa54503fc229ec7958bad18e2b99c2b325d805d22bbd2ac57bb28b33ffb14d67e8e948ea027fb0e7edaade21402a5ad6657289b452644b7d77dfbe8687776d08b929acefc91ba1940263ad1553f7cd98e5b6eff71ed662a2914ee14049524166f4328a5aa42b228ea7daadb53fa29b66a4be994d637e998507b1c25d81afc580db209a68bc42fa78f30a66082a57fd27661baa66f4ee18eb800f4ac7adc91987929a4185e43a4773c790ce692452163de6904a529f6ab6f58e2cd", 0xc3}, {&(0x7f00000005c0)="d5fcf846927bb83bcac70335ba7893ee1db642eebb1a4307da6874691485d6c1f61031faaea7fb7ccf7c09142a543cd1cfee22b817ee1726db4b362a65bb3c03274e6147c1d52c71cc5f230a54f15cadac5c3f6cc887d97f66630144423c12d32269e3c2e860739051ed0e92f2e28467235b22be", 0x74}, {&(0x7f0000000640)="9132230ac153bf9e2c3eeeb7049202815d9f6faff6d0726ae9e0a2377e7c414198611426fb8fee90c120ce0ea12f457cb1b748bf853146e4ff9945088da5", 0x3e}], 0x5, 0x0, 0x0, 0x8800}, {&(0x7f0000000700)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000940)=[{&(0x7f0000000780)="fe2205b1e36d0c8e5e8d6bfd239eab02343dfd96d4e4ba1255c4542505354e220653b94b1f06cf748f79715895ae73a8fa88c7fa5d8dcda0a006662f8d7fc43eef1c8586522a4668f8be4ab9db037fa40096bb5e0b0b7ccad3fbc9056526814694521ec2b8813372dba8a5cd118997dd587d88c48ea1c765ca456b5f485903d495d9a25bfe97962f4006582db36e5dca08d61af689639fb020e68177bf69461bbe5b44e2294a4394368bc7ce3d5b26764d9fdaaacf8eadc54b979a50ee29a6e91472bc818ed7546941999821753176b8d8185bf6", 0xd4}, {&(0x7f0000000880)="817964e060f69fd41472a72dec522b8efe52004e5d0e04e8397141f8d617d49d1c464af29405f290aff24caddbba389f7d9a2da095e104b61a3c7599d53c7608da8aef48853e4ad97d5874b9d6253053ba84432a7f4f192463279b78cfba622f751ed12c9a4313594efcf4b27d65a8776277d8f0ff80099be9170919de", 0x7d}, {&(0x7f0000000900)="edf3bdedf1480ca9df27a6158dd56cc5233a21dd57bd651b2dc070e3b63be2264cd01e4c1d098b967d709e9eeca3f8a56d8fc0", 0x33}], 0x3, &(0x7f0000000c00)=[@cred={0x20, 0x1, 0x2, r4, r5, r6}, @rights={0x18, 0x1, 0x1, [r0]}, @rights={0x18, 0x1, 0x1, [r2]}, @rights={0x28, 0x1, 0x1, [r2, r1, r3, r0, r1]}, @rights={0x30, 0x1, 0x1, [r3, r1, r0, r2, r1, r1, r1]}, @cred={0x20, 0x1, 0x2, r7, r8, r9}, @rights={0x30, 0x1, 0x1, [r2, r3, r1, r2, r1, r1, r3]}, @cred={0x20, 0x1, 0x2, r10, r11, r12}, @rights={0x38, 0x1, 0x1, [r0, r2, r1, r0, r3, r2, r3, r3, r3]}], 0x150, 0x4}, {&(0x7f0000000d80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000e00)="dd990c1cbafd4ba093927a5ebb1090f40fde1c243cea72907f1be78f47e28c0b88218179bb02bd0b56b6c64276e1cb7c3390053898fb7a71994573f6ef7f5a7c6916596c8f00c99aad22d03235ac22b08d2a6c1956ffdcb543f2b5bc2c25116d6e121e0f420bd64796d39335806ccd6f2fddf83be3fc6a94ed70e148d1bb3e89ed243bc97297a37905d930eedf1966a24a8e3e307d4e1ad4ac31ebdc708aada855a16c6a27f4e113a94a7a3ab28f97921644", 0xb2}], 0x1, &(0x7f00000011c0)=[@rights={0x18, 0x1, 0x1, [r2, r0]}, @rights={0x10}, @cred={0x20, 0x1, 0x2, r13, r14, r15}, @cred={0x20, 0x1, 0x2, r16, r17, r18}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0x88, 0x40}, {&(0x7f0000001280)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000001400)=[{&(0x7f0000001300)="f525cb3085b8b6fda4f1d4111d63f57088f6668020724a2406fd87a1e0bd247db8cc8fb5d082a62c6ba2d97d149213ea8b2c9b2e8302c67deefd9367f2e0528af763eca07c962787f510017d30d2238ae665c6d42de968c6dccc8bec55010d10019078a8863201b6c63a8ea058abc65cb22b744722bebf3b18d9ff39fdd57e8ae11c0dc962d8624fbc8941787ceddaae84cea8d7715b1682ee0c12bebea28f5ec2c723a534079751e2958f98647941e582df8f759139d2d5fc", 0xb9}, {&(0x7f00000013c0)="96eac100a86df3cd951294f5235256bf251a74d7257c5d0e017a9f98c29538c590786f319a519a524065e1ffb2659e9740d3208f343430", 0x37}], 0x2, &(0x7f0000001780)=[@cred={0x20, 0x1, 0x2, r22, r23, r24}, @cred={0x20, 0x1, 0x2, r25, r26, r27}], 0x40, 0x4000}, {&(0x7f00000017c0)=@file={0x0, './file0/file0\x00'}, 0x6e, &(0x7f0000001880)=[{&(0x7f0000001840)="92a2f98e56747320517e07507c2041bdea31608a", 0x14}], 0x1, &(0x7f0000001b40)=[@rights={0x28, 0x1, 0x1, [r3, r1, r1, r0, r3]}, @cred={0x20, 0x1, 0x2, r28, r29, r30}, @rights={0x20, 0x1, 0x1, [r1, r0, r1]}, @rights={0x28, 0x1, 0x1, [r1, r0, r1, r2, r3]}, @cred={0x20, 0x1, 0x2, r31, r32, r33}], 0xb0, 0x8800}], 0x6, 0x80) 07:50:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) read(r0, &(0x7f00000002c0)=""/177, 0xb1) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="3155c16e6d6ce18080512697cedd7c7c36d34bde650cd3a52e4f63ccddba0ad858e9d060104c1593e847faeac775d95e60ac6ff8f38e5de6d8e49d8eea1ae9e006a5bfadcf7f9678f1b39eb189a725ff79a5cb74540e3b2990976d931441b1c28239e138d77c6cc00920ec"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') getsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000200), &(0x7f0000000400)=0x4) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x2010000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 526.464806] hfs: unable to parse mount options 07:50:55 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='queue1 \x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00', 0x0) r1 = socket$caif_seqpacket(0x25, 0x5, 0x2) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='dummy0\x00'}) r2 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x4c801) r3 = dup2(r2, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x15\x00'}) ioctl$RTC_WKALM_SET(r3, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x25, 0x12, 0x7, 0x1f, 0xa, 0xffff, 0x6, 0x67, 0xffffffffffffffff}}) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NETID(r3, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r4, 0x1, 0x70bd27, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20048000}, 0x24000000) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0x7a1744ea) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@remote}}, &(0x7f00000004c0)=0xe8) r6 = getgid() write$FUSE_ENTRY(r3, &(0x7f0000000500)={0x90, 0xfffffffffffffff5, 0x4, {0x4, 0x1, 0x1f, 0x8, 0x7fff, 0x0, {0x4, 0x78, 0x400, 0x10001, 0x4, 0x0, 0x2, 0x1000, 0x100000000, 0x200, 0x1, r5, r6, 0x9, 0x2}}}, 0x90) setsockopt$IP_VS_SO_SET_DELDEST(r3, 0x0, 0x488, &(0x7f0000000200)={{0x2f, @rand_addr=0x4, 0x4e22, 0x3, 'ovf\x00', 0x2c, 0x3, 0x48}, {@remote, 0x4e21, 0x1, 0x9, 0x8e, 0x6}}, 0x44) 07:50:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x3800000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 526.564720] hfs: unable to parse mount options [ 526.756360] protocol 88fb is buggy, dev hsr_slave_0 [ 526.761545] protocol 88fb is buggy, dev hsr_slave_1 07:50:55 executing program 4: clone(0x100801000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000006000), 0x8, 0x0) r1 = gettid() r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f000001bff4)) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) tkill(r1, 0x2e) 07:50:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:55 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x40000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8c00, 0x0) perf_event_open$cgroup(&(0x7f0000000080)={0x7, 0x70, 0x166, 0x8, 0x22, 0x7b76bde4, 0x0, 0x7, 0x10100, 0xc, 0x0, 0x4, 0x4, 0xcaf, 0x100000001, 0x7b21, 0x5, 0x7, 0x401, 0x0, 0x9, 0x8, 0x7, 0xfffffffffffffffc, 0x6, 0x0, 0x2, 0x8, 0x6, 0x7, 0x5, 0x7291b7a9, 0xfffffffffffffff9, 0x0, 0xfffffffffffffffe, 0x4000000000000000, 0x7, 0xeb8, 0x0, 0x2, 0x6, @perf_config_ext={0x400, 0xffff}, 0x1, 0x20, 0xd8, 0x3, 0x2, 0x8001, 0x6000000000000000}, 0xffffffffffffff9c, 0x3, 0xffffffffffffffff, 0xc) syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x4003) r3 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x839, 0x80000) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x800000000010003) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) 07:50:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x3f00000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:55 executing program 5: r0 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_CONN_TIMEOUT(r0, 0x10f, 0x82, &(0x7f00000001c0), &(0x7f0000000200)=0x4) 07:50:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="3667a855de9fef15f0c376e2803f8608e309e1bbe500ded13c356bce28b630b172909fd6c80f87c3936582a0005e4f6b3034168e7703934bf5daeac11014d51b37fd9bf0d855cfe4c3c55efa3151b81dc735ff58f24999547bd3d51dc624e7b427911c61649d2912f4d3476deda66100bb60d829db0e0f9dcd5061642e6d439b"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000340), &(0x7f0000000200)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:55 executing program 5: syz_emit_ethernet(0x7e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004500019078ac2314bbac141411030290780000000008554df7338bd8b596450000000000000000110000ac2314aab2141400084000000000000070000000e000000200000000e000000100000000000000007f00000100000000ffffffff00000000e000000100000000ac141400000000006b2a6a60904cf95d6b4ee874728e86945e0fac2fd548"], 0x0) 07:50:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x4000000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000100)=ANY=[@ANYBLOB="dc070400000000000034eb6b77d361f302e6ddbd3039a60000ff48b03ce9561d04cb6bde404f9bcb9925c769beda50efe538461a1840af"], &(0x7f0000000080)=0x10) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000110007041dfffd946f610500090800000700000000000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 07:50:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x17, 0x3, &(0x7f0000000000)=@framed={{}, [], {0x95, 0x2}}, &(0x7f00000000c0)='syzkaller\x00', 0x5, 0x1000, &(0x7f0000000100)=""/4096}, 0x48) [ 527.236353] protocol 88fb is buggy, dev hsr_slave_0 [ 527.241412] protocol 88fb is buggy, dev hsr_slave_1 07:50:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x8cffffff00000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}}, 0x1c, 0x0}], 0x1, 0x0) [ 527.316337] protocol 88fb is buggy, dev hsr_slave_0 [ 527.321447] protocol 88fb is buggy, dev hsr_slave_1 [ 527.335637] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 07:50:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) fsetxattr$security_smack_transmute(r0, &(0x7f0000000180)='security.SMACK64TRANSMUTE\x00', &(0x7f00000001c0)='TRUE', 0x4, 0x1) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') setsockopt$netrom_NETROM_T4(0xffffffffffffffff, 0x103, 0x6, &(0x7f0000000080)=0x3, 0x4) getsockname$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000140)=0x1c) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ubi_ctrl\x00', 0x0, 0x0) 07:50:56 executing program 3: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000140)='bic\x00_x\xb8\xc6\xb5\xd4&\x19\xf9\x8d\xa4\xf8\x12\xfc\xd7Y\x95v\a\x845w\xf6:{O\x8e\xf3;\xcdm', 0x6327e65a746bfbec) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) 07:50:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xf6ffffff00000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 527.476335] protocol 88fb is buggy, dev hsr_slave_0 [ 527.481568] protocol 88fb is buggy, dev hsr_slave_1 07:50:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffff000000000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000580)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0x410000, 0x0) r2 = getpid() ptrace$getregset(0x4204, r2, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=""/83, 0x53}) r3 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x20080) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x4, 0xa, &(0x7f0000000300)=@raw=[@generic={0x7, 0x8fd, 0x6, 0x6, 0x6}, @map={0x18, 0x2, 0x1, 0x0, r1}, @exit, @jmp={0x5, 0xfffffffffffffffe, 0xd, 0xb, 0xf, 0x8, 0xfffffffffffffffc}, @exit, @map={0x18, 0x4, 0x1, 0x0, r3}, @jmp={0x5, 0x3, 0x6, 0xc, 0xa, 0x80, 0x14}, @alu={0x7, 0x3, 0xf, 0xa, 0x4, 0xfffffffffffffffc, 0xfffffffffffffff0}], &(0x7f0000000380)='syzkaller\x00', 0x1000000000000000, 0x29, &(0x7f00000003c0)=""/41, 0x41f00, 0x1, [], 0x0, 0x7}, 0x48) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r3, 0xc028ae92, &(0x7f0000000540)={0x8000, 0x5}) 07:50:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:56 executing program 5: add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) unshare(0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f0000000040)=0x1) setsockopt$rose(r0, 0x104, 0x4, &(0x7f0000000080)=0x1, 0x4) gettid() socket$netlink(0x10, 0x3, 0xe) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, 0x0, &(0x7f0000000400)) ioctl$sock_bt_hidp_HIDPGETCONNINFO(0xffffffffffffffff, 0x800448d3, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) ptrace$getenv(0x4201, 0x0, 0x0, 0x0) execve(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 07:50:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0xffffff7f00000000, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 527.830779] netlink: 8 bytes leftover after parsing attributes in process `syz-executor4'. 07:50:56 executing program 4: r0 = userfaultfd(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = userfaultfd(0x0) close(r2) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x22000, 0x0) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000280)=""/179, 0xb3) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000080)="db7476926b3acd54d1a9ea8a2880b2530874cd294b6bdcdf69392ddaa856747be9cd7e96df2581a62e4e5e5143dd2555e73f3c9701fe9820aed4063dbd0dce6960e107690a44f170b7e57e590932cf5820a897cfd0013b25d0ddda5419b92d147a69fc391579", 0x66}, {&(0x7f00000001c0)="5b0b5f43683bcd39d6b4d8110af9d318a33c61fe0206826c6df0ce34de8137d8b3d1f89add4c08be6336498c7a51e8904bdd5985eaf7c8d61804c2da5e3730e42e88726191055c8ab4629ffe0f46672309fce4b7de5477a58538ac1fbae9650f9889849b74a8ddaef87f839cff17460359d51a913e628a35f3d8fca5e8c3f0d1f165a99f9ebce169820551bfe932073b7cf59d0ccaafb9968ad93dc158c33ae5d18fb4283633c2e61af3e16ed133320a7e95d06fd9002a1fa308", 0xba}], 0x2) dup3(r0, r2, 0x0) 07:50:56 executing program 3: r0 = getpgid(0x0) ptrace$pokeuser(0x6, r0, 0x101, 0x100000001) r1 = getpgrp(0xffffffffffffffff) r2 = getpid() migrate_pages(r2, 0x0, 0x0, 0x0) sched_getaffinity(r2, 0x8, &(0x7f0000000040)) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0x7) 07:50:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'srans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:56 executing program 3: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f00000000c0)=r1) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x0, 0x1) read$eventfd(r2, &(0x7f0000000000), 0xffffffffffffff11) ioctl(r2, 0x4147, 0x0) 07:50:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tsans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:56 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x181c40, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x6, 0x8001}) 07:50:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r1, &(0x7f00000002c0)={0x2, 0x6}, 0x2) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x840, 0x2) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000200)={0x1, r1}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r3 = socket$tipc(0x1e, 0x2, 0x0) getsockopt$TIPC_DEST_DROPPABLE(r3, 0x10f, 0x81, 0x0, &(0x7f0000000180)) accept4(r2, &(0x7f0000000040)=@pptp, &(0x7f0000000140)=0x80, 0x800) getsockopt$nfc_llcp(r2, 0x118, 0x0, &(0x7f0000000240)=""/6, 0x6) socket$rxrpc(0x21, 0x2, 0x2) ioctl$SIOCGETNODEID(r3, 0x89e1, &(0x7f0000000100)) 07:50:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tran%=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:56 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5441, 0x0) r1 = dup(r0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f0000000080)={0x0, 0x80000000, 0x0, [], &(0x7f0000000040)=0x3}) 07:50:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:56 executing program 3: io_setup(0xb8, &(0x7f0000000000)=0x0) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, &(0x7f00000000c0)=0x80, 0x800) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0xa000, 0x0) io_cancel(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x10001, r2, &(0x7f0000000100)="b781be462bed24e1c01d84199e666295f8a73104dd21d84db098b113bda969f38645fb43cf59e6c091cdc8e1c2633619ad5ad0fe14551762271b2b93e93cc88e0ddaee11962ceab41fe744ba29d7742fd627f3dc01f52632c2947755d63e6ea656411a10ae8f6b8440aa077e4f57688aefe1ba37", 0x74, 0x2, 0x0, 0x1, r3}, &(0x7f0000000200)) r4 = syz_open_dev$cec(&(0x7f0000000240)='/dev/cec#\x00', 0x0, 0x2) ioctl$BLKALIGNOFF(r4, 0x127a, &(0x7f0000000280)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) ptrace$getregset(0x4204, r5, 0x200, &(0x7f0000000400)={&(0x7f0000000340)=""/131, 0x83}) prctl$PR_SET_PDEATHSIG(0x1, 0x20) r7 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000480)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000540)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x14, r7, 0x700, 0x70bd26, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc055}, 0x4080) syz_mount_image$gfs2(&(0x7f0000000580)='gfs2\x00', &(0x7f00000005c0)='./file0\x00', 0xe1a3, 0x8, &(0x7f0000001a80)=[{&(0x7f0000000600)="3f64f6ff1ae41d9062de2e1e11b436633328ddb2b0e23a4a898cbdb0679d6387eb741f42f71c107ac669e5201bc53455390dffcde224f2a5918e8eaa727389f130a88971733b3fe1d522514a702f8fe298e48856080dfa1edcade4b863cd34247e81847d85b34938583ad00c27daae38440ba9a28838c0ad2606a8e08b0a0d66d6003d4ffbe1ce5d036cb53535cdc9b2befde07fadd7fe885358f6fec5b8bba2401ec5f85a66099d147cbd1dbccff0dbf2b3513e00707823a7d80ece0b3ba197c4ac55109e047599fa9eedc2a4bcb8872d03e26152f9c552175e8e5aa0fd54a444476a2af4b79808144b53e24b3d50b2248fd1e492a4", 0xf6, 0x3}, {&(0x7f0000000700)="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", 0x1000, 0x936}, {&(0x7f0000001700)="5ed478b4a9d4ab2dd3339750f1c51c27f3be09c3dc481d20949e6b41a2286f345d2f1f78eee9c8f609a5c40f82620a", 0x2f, 0xc96}, {0xfffffffffffffffe, 0x0, 0x7fffffff}, {&(0x7f0000001740)="83bfa19ba9e66e74765d6f5291e594d6d696064a6f82a4bf78ea01be68bb9c101d32db75457367587c18a2b3995de8619b175ce282dddd3c2c27d5c5c6f27a749a4a998fdc451dbdd06cdc0615d0053de1a4df2557155a2173882e3555b0332eece6a46a1854d758fbb1347c4a6d22105b209c1263e61c7e962f8177a61f6486d5245c54cb13c08a1b2a37b86c54b67a7283eb99a672851e70407c6e01027899b19ab3b543c76a27d40e8eb15b280209cc0994a86997b2b3fd5824d9", 0xbc, 0x8001}, {&(0x7f0000001800)="39a2e4e6836397d8d5d7aa5d2a74e938fdebde0e8751399fb7eaca7c2b8ba0194da5bd32e74b21f8b82b40edcf19a0e3a26de80dd21c9288db408e162f9feb34234af067009e0036ba93081a2c8f1f52d6ae1309b00d2dd6fcf870e6084b6b0cb2d6260ce10f09a81beeecf7cab69200ac4e6940944e3b8b442ea92cae4cfcf52c61e6e191a763fb1c3c0e49bf3e05482098fc0a7368ad5cd9f427d3f2b7ccc5280672ef89f82efc5c", 0xa9, 0x3f}, {&(0x7f00000018c0)="a2dc60f85bdda5199cafe6a8d46a520125ab35587f424e05736ddaff3555a27e976dc0924ad557ea038b27c4364ced6e15b3e418996326239ea7ff4f0ae102f40c2b331a5005e81aab8e8947aad9b1105f132f84b2b29793170cec34eff42daf4b3a08c1ced159443ae5d68d6b1f078af965eb82a84f75178ccebd3e978e9edbb47d578439b52ddbad6b7d42d1dcd0c13743213e68e6f984d310058c99351f65ff1d0c0d3b8c65196880cfd663cb7faae1ab5aa1d249fdf0b67aaae494892d4774914d843879dc781d0b6fb8a05bf6b6f32e4f16b046c209696b9b4c842400c0", 0xe0, 0x100}, {&(0x7f00000019c0)="cdea5be7ecb6940e5a7ac5f993f0b0cbbeda3d274e69e77f5df04860ea986d790b2c9243577efc5cbb7f1391b8c506b5b40cc82ab2488f2e4d80fa1f72bdc39fbe076adb7b72604e034ac7a81bda94cca76b4d1b4ba60fe29ee21a6e49975410844c6a685eb85bf0be60b065be28f875cb2b9baa90f52fa78e94a72ad1161d683c6841ff02b5b8ca7672c02e2388d4b6bdd17033dda525fa3ae25984abc70fc9278273825ff8c5b0c30b09df61b837a8b60026ac698e83bf8f67fbbdccb64120", 0xc0}], 0x82, &(0x7f0000001b40)={[{@quota_off='quota=off'}, {@spectator='spectator'}, {@noacl='noacl'}], [{@context={'context', 0x3d, 'user_u'}}, {@appraise_type='appraise_type=imasig'}, {@uid_gt={'uid>', r6}}, {@fowner_lt={'fowner<', r6}}]}) prctl$PR_SET_FPEXC(0xc, 0x0) r8 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@initdev, @in=@empty}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f0000001cc0)=0xe8) ioctl$SIOCAX25NOUID(r1, 0x89e3, &(0x7f0000001d00)=0x1) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r2, 0x84, 0x1e, &(0x7f0000001d40)=0x3, 0x4) setsockopt$netrom_NETROM_T2(r1, 0x103, 0x2, &(0x7f0000001d80), 0x4) ioctl$PPPIOCSDEBUG(r4, 0x40047440, &(0x7f0000001dc0)=0x7) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000001e00)='/proc/capi/capi20\x00', 0x80000, 0x0) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r2, 0x110, 0x5, &(0x7f0000001e40), 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) r9 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/rfkill\x00', 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r9, 0x6, 0x16, &(0x7f0000001ec0)=[@sack_perm, @sack_perm, @timestamp, @window={0x3, 0x8, 0x47d12577}, @window={0x3, 0x3, 0x7f}, @timestamp], 0x6) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r9, 0x4010ae74, &(0x7f0000001f00)={0x7ff, 0x80, 0x800}) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000001f40), 0x10) ioctl$KVM_SET_NR_MMU_PAGES(r4, 0xae44, 0x9fa) clock_gettime(0x0, &(0x7f0000001f80)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r3, 0xc4c85513, &(0x7f0000001fc0)={{0xa, 0x2, 0x1953, 0x1, 'syz1\x00'}, 0x1, [0x8000, 0x9, 0x10000, 0x5, 0x6, 0x5, 0x4, 0xfffffffffffffff8, 0x5, 0xf0c, 0x100000001, 0x5e, 0x1000, 0x100000001, 0x5, 0xa3bb, 0x0, 0x3, 0x0, 0xdb4, 0x3f, 0x7fffffff, 0x3, 0x2a4e, 0x1, 0x20000000000, 0x400, 0x3, 0x101, 0x8, 0x300000000000000, 0x10001, 0x8, 0x6, 0x9, 0x1, 0x4fec57cd, 0x3aa0786d, 0x10000, 0x1, 0x401, 0x7fffffff, 0x3ff, 0x1f, 0x5, 0x9, 0x3f, 0x5, 0x7, 0x40, 0x0, 0xffffffffffffffe1, 0x4, 0x0, 0x4, 0x4, 0x18, 0x3, 0x2, 0x8, 0xc738, 0x7, 0xd4, 0x224a7cbd, 0xfffffffffffffffa, 0x9, 0x5, 0x100, 0x431, 0x3, 0xef, 0x98, 0x56c, 0x0, 0xffffffff, 0x101, 0x3, 0x7, 0xfffffffffffff0bd, 0x5, 0xd76, 0xa102, 0x0, 0x3c, 0x101, 0xcbe, 0x2, 0x3, 0x3, 0x5, 0xff, 0x5, 0x9b63, 0xfffffffffffffffc, 0x1, 0xe1cf, 0xfb35, 0xc3dc, 0x8, 0x2, 0x80000001, 0x3, 0xa942, 0x0, 0x0, 0x0, 0x9d, 0x6, 0x2, 0x6, 0xffffffffffffff75, 0xfff, 0xf09, 0x9, 0xffff, 0x800, 0x2, 0x7, 0xfffffffffffffe00, 0x1ffe000000000000, 0x40, 0x6, 0x6, 0x6, 0x8, 0x6, 0x8, 0x1f], {r10, r11+30000000}}) 07:50:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0xfffff, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@local}}, &(0x7f00000005c0)=0xe8) syz_mount_image$f2fs(&(0x7f00000002c0)='f2fs\x00', &(0x7f0000000300)='./file0\x00', 0x340c3a21, 0x2, &(0x7f0000000480)=[{&(0x7f0000000340)="fa28e880d630fb997f205ec2705c63acbc1a", 0x12, 0x5}, {&(0x7f0000000380)="bdf449639b3f6cdd3c07e1ee27cf634ee5c7bc95ce8cb5afc9b3ba9420e13f796250a5a9178b63ea0e4a582cddec6e3ca0bc561b05ebeeab24037ea6b7d9875c4a5a795ffec1a4ac4fdca50accde6d839d712e78320c24eb5585c9638de6d2178c2cdb4bfc03fe21ee60590b7eb1328fad560b3d4412c2d2fbada9184ba6db45833f6d95c81b98700cb87188f0ba8fd2f9d80725548f38883f6a183b6a139e678b3ef9d2c12c9659bc81bcebaf65fa5a8111b33cde6f8e3f3e47942fa1768135462c02950f03cc", 0xc7, 0x3}], 0x100004, &(0x7f0000000600)={[{@noinline_data='noinline_data'}, {@background_gc_off='background_gc=off'}], [{@hash='hash'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'ramfs\x00'}}, {@uid_gt={'uid>', r1}}]}) r2 = syz_open_dev$midi(&(0x7f0000000680)='/dev/midi#\x00', 0x830, 0x100) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000006c0)={0x0, 0x61bd, 0x20, 0xb40c}, &(0x7f0000000700)=0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000740)={r3, 0x11, 0x6, 0x1}, &(0x7f0000000780)=0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x292}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:56 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$HCIINQUIRY(r0, 0x400448e4, &(0x7f00000000c0)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) connect$caif(r1, &(0x7f0000000040), 0x18) 07:50:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranI=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:57 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) lstat(0x0, 0x0) mount$9p_tcp(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f0000000280)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x200000, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$RTC_PIE_ON(0xffffffffffffffff, 0x7005) connect$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r0, 0x8818564c, &(0x7f0000000340)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EVIOCGEFFECTS(0xffffffffffffffff, 0x80044584, 0x0) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 528.365756] gfs2: invalid mount option: context=user_u [ 528.431874] gfs2: can't parse mount arguments 07:50:57 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:50:57 executing program 5: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000000)) r1 = memfd_create(&(0x7f0000000100)='t\x00\x8c\x00', 0x0) pipe(0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r0, 0x0, 0x2000005) fsetxattr$trusted_overlay_opaque(r1, 0x0, 0x0, 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x1000) 07:50:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranQ=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) [ 528.477331] 9pnet_virtio: no channels available for device 127.0.0.1 07:50:57 executing program 0: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$VIDIOC_ENCODER_CMD(r0, 0xc028564d, &(0x7f0000000340)={0x0, 0x1, [0x3, 0x1, 0x9, 0x1, 0x6, 0x6, 0x6, 0x1]}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="64653d303622be4a8fc2445914313c0fb43d9118976b96eef7df43b846bae69c61df7ff57816cbbbb439a04a91267c0a4c21e9928d997c73a1d42711572c7b9d6ee4abcfbd1ca8897f0256b569cdb18df27b25c46cbbef70aeec683107769da5597f21f802d26db28a1038a58399650a450b"]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0xfffffffffffffee3}, {&(0x7f0000000380)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000000400)=""/239, 0x47}], 0x4, 0x0) prctl$PR_SET_ENDIAN(0x14, 0x2) 07:50:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranR=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup(r1) ioctl$EVIOCSCLOCKID(r2, 0x400445a0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) dup(r1) ioctl$HCIINQUIRY(r3, 0x800448d4, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r3, 0x408c5333, &(0x7f0000000000)={0x4, 0xfff, 0x200, 'queue1\x00', 0x5e53f2f8}) setsockopt$RXRPC_SECURITY_KEYRING(r3, 0x110, 0x2, &(0x7f00000000c0)='-\\]cpuset[proc\x00', 0xf) 07:50:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:57 executing program 0: rename(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file1\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1020008915, &(0x7f0000000200)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) ioctl$SIOCAX25CTLCON(r1, 0x89e8, &(0x7f00000002c0)={@bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5, 0xffffffff, 0x2, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @null, @null]}) 07:50:57 executing program 3: syz_open_dev$sndctrl(&(0x7f0000000100)='/dev/snd/controlC#\x00', 0xffff, 0x0) r0 = creat(0x0, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000500)=""/181) setsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000080), 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000003c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x9) socket$inet(0x10, 0x3, 0xc) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001240)=ANY=[@ANYBLOB="e4000000290200000000000000100000060000000000000000040000000000000207002e2f66696c65304004000000040000000000000001010000000000000507002e2f66696c0200000000000008000000000004009f74755c6e28d01d34c2a147c43ebec850fe166b9aa6649fd95e9b48579ac0d1ee6799c17f12b551c404fb4bc5a95a7acc9034ab180cd862316ff4094f56f61f166f72117afc7fc1ef1e9216926bdb9ab4ae70f26358a73af8a2ed131ff743336e920d7231993256d24a93deefaf88f0fe1bdb2cb5c7ad4c1546bd94"], 0x88) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000240)='bdev]\x00') getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000d00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000d40)={{{@in6=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@initdev}}, &(0x7f0000000e40)=0xe8) lstat(&(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000f40)=0x0, &(0x7f0000000f80), &(0x7f0000000fc0)) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000180)='./file0\x00', 0x3, 0xa, &(0x7f0000000c00)=[{&(0x7f00000002c0)="f56e7412332694b91987dc6ec36bffa57695f9494bb39df1ab8b41fb45f0db63232bf518b4e22da520997c2f971cea541c1d352b117d20745ac3af7d56f9458f42c9285e443b1ffb18fd9681", 0x4c, 0x10001}, {&(0x7f00000005c0)="cb4e0b3b5c010243f9cc2cf9d33073e23d7f07fe2e6fff4cd87b31c52dacd907f35a9df561ef7f081eebea9b3b539f41ffe1dc37a271efd953396ca0310fd504a5acfd99400ddd2f16739a66e8d17b19a1872c8e92f15041535ec75ed655849dcf8a52d3c00b69b51c2abe68202917b00816de1daf31138c45563b1031fb49f4c99b4fa487b3a1316e17a79c1e1cf3016c9cd0d421f809104149280c38bb63197c", 0xa1, 0xfffffffffffffc00}, {&(0x7f0000000680)="1107fd0d0d31197ff2997b7b2d532be9b67c2119b5c33d740841c4aab7ce2bf75d59422d27984ca0c12892c15899d7ea9f74f1c62f233b938c1a18c1acfd6f2835e5890940e68b82dfcc02c42b27ffef74cb1b8c727d7b75de2a23a60a7aa46a8f09bf7eb260f020ee3a2520bb1a90d73ba0fa72dd61fbc45f4d38d569a394fe73f28ec6636465c368bcd3501fb4f949b2990fe778b466df89d3b512f0c3f347ae0fe02d96f8e701a2a5819e06c7dd17eaa93cea9e0a2beceec256856bc80d6c4053f4a56b658f4e", 0xc8, 0x3}, {&(0x7f0000000780)="1f84e7ef24da317d745f92cca25632678ac989f6d2b3bcef91863c176b009e5c91e75bd047474687ad29915f0d853221f0e2a0087b61008a7786271d6d6d5010185dadabe3d6f95261646233ed2c9b52f4e69c306bfd4217c71c621e4f4beffc073caeed05d277e3faafed6a5794f56cfae0c56cb307963e5a645c2f36a9253623d4bd22d19bcc997c5853c64bb53a73f45de9dd4eb3063794fdbb99e7120a201bff89530b3150529bab30366b10967eb40231b9ae550b071b5ddb7dd0f154f7b11ca91ea04384d8bf871739294a64443b", 0xd1, 0x100}, {&(0x7f0000000880)="20551de51e494194d4d281f8e503225da3a7c598d3f4d6ea1b1c1e271e122a1a5dc2a25de7fad29aec2dfc99c60384b0cc933ff6885b6c5bd7863024bc0eb517d182a5f5909e07bbd95ffb7760b989d1941946817339c379b8d6e9e9ce7316401be2a160e4fa7fc63824a64aeb525d379290d289980e783887c45bececd86f119576c03283d76325e2e525349891bc4ed0034fbe6397992559a2ee726f47b81ba7f77b98dd1d79329b28852f641e69f6698beb46b9ee472bd2cb3002b54c8c15d3cef39fe12329717f029211f17a40d5c16650b63d017d7441b67ba37d", 0xdd, 0x3ff}, {&(0x7f0000000340)="1d28f4f7e8d2909e9435769c2acd607d2d97a6b25e87cf06b78c89dc65504954b8062e676ad19e0d8fa801c65f988a89d84b545284e2e805f25d83c462df29aa3077e58dfa8022e2727853322b46f2e56dc529b29161fe896b41831db2f3f0d20d066bbffee58a9b9789cce37269e8d74d179b07f6f35e615b2e5333200e5f8b", 0x80, 0x20000000000000}, {&(0x7f00000001c0), 0x0, 0xcec8}, {&(0x7f0000000980)="900cda3a2f716e6a2d435ab7936028ac9f8d6a613702dd38cdf3990da1ed1bb499e1242a18f8653b04ee1af47ef4f6a1e935fa1c71497bb57daebacd001a3a168985b9dca49013d6f93b57d24bf4d6b5a2295516b0ee49c1fb8ff2d50ac5a1eaffd529b897a2f411b140b2443e2b614789f287789f012f95858471e260e294a7ff7f10ea03f064ac464f038452ebba774e2b204c5e0b52d5919fc43eb2a2e37d1b7109330a4a41e8d969b8a588619e5f83d53484b12293eed5f95dddac613094e205873e404df52323803da40116e4caf61539be10837bac6817382be6e8", 0xde, 0xff}, {&(0x7f0000000a80)="e9c991b22a6b21e91d00dbf781bfffd618cbf30236753f88d4ca93073fd5be9a3afe346440ec2601b777560f5feafc05ae60b69fc7136be659d05b9b1f780884832e5d92a1c87b4c162bf99aadfcad11abbd7727dd6d37cbdf8ab8a9105d8c2c1c1661a83994393ee16175d817133621e660914ad00bd3b932a28e01c52746650af37e6655faecabc71e9867e50767a644cf15d84b6a97cd50b9f93a3f9347f8ab2d63a1ea14fc0b1ad6639d7ae06c7c50f3003e4baf24b6ea790378ac6132d9467572c3edaf31a5768e0cec4909cbb1929e166b3619ca18190201c54749", 0xde, 0x8}, {&(0x7f0000000b80)="06a058196673a41b73b6ea1ff084fd6a3ba7c84351c51bf14a9a5fe0fdb16bf0321550699080a325b17a7f3d81531a8b75bf746effe9e1eade43c338f8f49d32ad5bcd8354ed7579b729f1c680f01ad10616d9921975e07aa06e1ab7a25189adce7e2ae53e5bf733a844ecf7ec1735dfb86382430a8a5bf6db4fe0", 0x7b, 0x7}], 0x40881, &(0x7f0000001000)={[{@acl='acl'}, {@clear_cache='clear_cache'}, {@barrier='barrier'}, {@fragment_metadata='fragment=metadata'}], [{@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x9}}, {@fowner_lt={'fowner<', r3}}, {@fowner_eq={'fowner', 0x3d, r4}}, {@euid_lt={'euid<', r5}}, {@euid_lt={'euid<', r6}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@obj_role={'obj_role', 0x3d, 'cpuset]keyringppp0keyring'}}]}) 07:50:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x4, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f00000000c0)={0x0, 0x0, [], @raw_data=[0x5, 0x69b, 0x5, 0x4, 0x7fffffff, 0x4d, 0x7, 0x0, 0x7fffffff, 0x1, 0x6, 0xfffffffffffffffe, 0x4, 0x3, 0x8, 0x0, 0x7, 0x85, 0x7fff, 0x4, 0xfffffffffffffffd, 0x9, 0x3ff, 0x800, 0x1f, 0x3ff, 0x6, 0x7fff, 0xf66, 0xf65, 0x1, 0x5186]}) r1 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000000080)) 07:50:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:57 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:50:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranS=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='moieu0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:57 executing program 3: perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000008c0)='/group.stat\x00<#\x12W*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:C\x1bJ\x7f\xa2\xf3\xc4\r\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00zq0pn\x180\xc1\x1e\xbeY\xc6\xd2#\xdd\v\xa11\xa0', 0x2761, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0x0, 0x0) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000300)={@remote, 0x22}) r1 = socket$inet6(0xa, 0x3ffffffffffd, 0x0) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x4a) setsockopt$inet6_tcp_int(r2, 0x6, 0xa, &(0x7f00007b1000)=0x81, 0x4) ioctl$KVM_GET_ONE_REG(r2, 0x4010aeab, &(0x7f0000000140)={0x3}) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000440)='dctcp\x00', 0x6) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="0000809a048e300205c9825d48178c4f00", @ANYRES16=0x0, @ANYBLOB="00f0bf2def1860215ac8778e0b404330740a78a80000000000"]}}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, 0x0) clock_gettime(0x0, 0x0) setitimer(0x0, 0x0, 0x0) r3 = open(&(0x7f00000001c0)='./bus\x00', 0x10000000143042, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f00000002c0), 0x4) getsockname$packet(r2, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000380)=0x14) r5 = add_key(&(0x7f0000000400)='logon\x00', &(0x7f0000000540)={'syz', 0x0}, &(0x7f00000006c0)="e8531084255b0e20b711ddf0165f17788284d2d34d9901a1cdca73b6684b37fcb180c01b7b5fcd288f554ffb1696b9b1848dd18ff1a1be9eb795c441f4a828868b81fdd52c026a3601e389b1f5af3d468bc63e54f273894d2f2ddbed832f5b6acf88a981dd93c327aeed501464c5388984565fe0f4dd75", 0x77, 0xfffffffffffffffb) keyctl$update(0x2, r5, &(0x7f00000007c0)="7d7fb57439f7cd640cbe4ca9516746468c38f9b365960368006d8481da51a441308c84addd2effc99a24790e84b8e2b686aa41d5acf10c0e31fa27cdc11d3540262c5a56ae8c41c717989ae619643c17b077655b75250df9721864", 0x5b) ioctl$sock_inet6_SIOCSIFDSTADDR(r3, 0x8918, &(0x7f00000003c0)={@remote, 0x1f, r4}) personality(0x100000) setsockopt$netlink_NETLINK_NO_ENOBUFS(r2, 0x10e, 0x5, &(0x7f0000000500)=0xb5, 0x4) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000005c0)) getsockopt$inet_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000600)=""/128, &(0x7f0000000680)=0x80) ftruncate(r3, 0x7fff) sendfile(r2, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 07:50:57 executing program 5: r0 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mISDNtimer\x00', 0x10001, 0x0) write$binfmt_aout(r0, &(0x7f0000000180)={{0xcc, 0x3, 0x4, 0x389, 0x358, 0x1000, 0x230, 0x3}, "f9d36dffe07af2668d9646", [[], []]}, 0x22b) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) ioctl$SIOCAX25GETUID(r1, 0x89e2, &(0x7f0000000140)={0x3, @null}) 07:50:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:57 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(r0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0x1c8, 0x0}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='/exe\x00\x00\xc1\x00\x00\x00\x00\x00\xe9\xff\a\x00\x00\x00\x00\x00\x00T\xfa\aBJ\xde\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xf5\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r5 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r4, 0x6) connect$inet(r5, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) r6 = accept(r4, 0x0, &(0x7f0000000080)=0xfe0f) sendmsg$alg(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000980)="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", 0xd02}], 0x1}, 0x800) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) r7 = syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) fcntl$getown(r1, 0x9) getgid() getpgid(0xffffffffffffffff) lstat(&(0x7f00000005c0)='./file0\x00', &(0x7f0000002240)) fcntl$getownex(r2, 0x10, &(0x7f0000000300)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000940), &(0x7f00000022c0)=0xc) ioctl$TIOCGPGRP(r7, 0x540f, &(0x7f0000002300)) fstat(r6, &(0x7f00000000c0)) fcntl$getown(r2, 0x9) getgroups(0x3, &(0x7f00000023c0)=[0xee00, 0xee00, 0xffffffffffffffff]) getpgrp(0xffffffffffffffff) lstat(&(0x7f0000002400)='./file0\x00', &(0x7f0000002440)) sendmmsg(r5, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) sendfile(r6, r3, &(0x7f0000000180), 0x10000014e) 07:50:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranT=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x80102, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r1, 0x4038ae7a, &(0x7f00000003c0)={0x0, 0xa7f, &(0x7f0000001480)="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", &(0x7f00000002c0)="8881878a9be681d347c163e0aebcfbecb3ecc2977ada5f60ae91581df254bcc0075248e296131aedcfd63f086795c4ba38b36823849e1c57363424a18ad5f1f8682ebc95230e215f4d2d409e2def8cf993179f093ad18aecfcae8f3943421ea4dfb8a0c2926194895dad54a2d0107e00cdcc5930d0fe80f17cc8356743fb123be2d72aa47890ec3b018b68e8aec24b7889e20caca94d8a4d398a06753e40ba197141f6d6837ebd94931ef2a678247fbb49a189402d77e28f8b86dd0e11e33c650a8df1d0e5a43527b06f777f702fd6fd", 0x1000, 0xd0}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:58 executing program 3: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040), 0x58) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = dup2(r0, r1) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x5, 0x7, 0x2, 0x81}, {0x5, 0x7ff, 0x9, 0x3}, {0xff, 0x1656, 0x6, 0x7}, {0x401, 0x3ff, 0x6, 0x4}]}) 07:50:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:58 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:50:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranV=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x20001000008912, &(0x7f0000000040)="0af51f023c123f3188a070") r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x84000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000080)) socket$inet6_sctp(0xa, 0x5, 0x84) futex(0x0, 0x6, 0x0, &(0x7f0000000140)={0x0, 0x989680}, 0x0, 0x0) 07:50:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="a5bb21768e21a2f335c6353aba5db3aa26097ffc266117fb398da7dd1ac0e2079dc1d939c67ab0e62f02bb68ccc080a5c7822ae19cb7c3e4e61f1ba6873169af40ec14cf935ea888c4147a57ef96f5b0260ed9de3edf392bf04adf845a403dfad829dc861dccf1fc3d994d805561fa46d2"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x7fffffff, 0x20, 0x3, 0x100, 0x5}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f00000003c0)={r2, 0x7, 0x30}, &(0x7f0000000400)=0xc) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000200)='./file0\x00', 0x0, 0x320a635c961f7ec5}, 0x10) preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:58 executing program 5: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100), 0x4) ioctl$int_in(r0, 0x0, &(0x7f00000000c0)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x0, 0x0) utimensat(r1, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={{0x77359400}, {0x77359400}}, 0x100) fcntl$getownex(r1, 0x10, &(0x7f00000001c0)={0x0, 0x0}) sched_setaffinity(r2, 0x8, &(0x7f0000000280)) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = gettid() ioprio_get$pid(0x2, r4) getgid() ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000400)={0xf28, 0x6, 0x2}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/keycreate\x00', 0x2, 0x0) connect$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000006}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x6, 0x4000) sendmmsg(r3, &(0x7f00000002c0), 0x400000000000027, 0x0) 07:50:58 executing program 3: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) setsockopt$rose(r0, 0x104, 0x0, &(0x7f0000000080), 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2000, 0x0) ioctl$SIOCAX25OPTRT(r1, 0x89e7, &(0x7f0000000040)={@default, @default, 0x2, 0x64}) 07:50:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranb=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000009c0)="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") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='ramfs\x00', 0x80000, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="3cb6a444163fd0e44dc1599f2c350c7706e59e14f59c73b0a7"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:58 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:50:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:58 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x400, 0x8) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000180)=0x0) ioctl$KVM_DIRTY_TLB(r0, 0x4010aeaa, &(0x7f0000000240)={0x101, 0x7}) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f00000001c0)={[], 0xfffffffffffffffb, 0x4, 0x0, 0x8, 0x2, r1}) r2 = syz_open_dev$sg(&(0x7f0000000080)='/dev/sg#\x00', 0x100000003, 0x0) ioctl$SG_SET_RESERVED_SIZE(r2, 0x227a, &(0x7f0000000000)=0x2) lseek(r2, 0x0, 0x6) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x101800, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f00000000c0)={0x5, 0xc06, {0x56, 0xff, 0x13daa0000000000, {0x6, 0x3}, {0x7d, 0xe000000000000000}, @ramp={0x3ff, 0x3, {0x5664, 0x8, 0x7, 0x1ed4}}}, {0x57, 0x2, 0x0, {0x100000000, 0x7ff}, {0x8, 0x805}, @ramp={0xd9fe, 0x1000, {0x9, 0x101, 0x9, 0xd5}}}}) 07:50:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trand=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:58 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000003c0)=ANY=[@ANYBLOB="8dc64b0a757137305e58a396b661e9be9dfb580ff4672a0948f62e9befc7f3a92c88895db596f7f51572caf85413922ef5033ddff6505fa5b9442e1924da149f0a17e6fe85da8ad6c5a3a51952f90000e07dbc5d017a87ac1156dbff0d492b9c2a0970c30bb04cbdf55f2800f5ecb9c7b3e174169a6f795f160b02c0334aee574aacc6dfb72cdc000000000000000000000000"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="b0ab1505a5c886c6b32d6fc22978804b84a6daa062f8622edec099675329b05079fb1d1cd4591dda15ef2198d3d4a92173d9d7f8080f09f62f87ee15ae266c38fce2240ab46817b92cc686e716108376a01509a5aa06e6d881b792b7df42f3d7fe683aab375c4b7d809c579249145fc9f0330b914e292f6fce4b83ab087d2795da35cf2f6b087396017bfd6e17f19b612bf27914fa97cae75eca424031d69d66cb5594b8978d2e460fb90dd4e7b29d7afd9dab3544e3c65e4eb5717f328585010814cb96fad8577b42689a9515c5288f8cb1eb59f400f0446fe7f0022e816b5f28cc23efff"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f0000000200)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trang=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c, 0x0}], 0x1, 0x0) [ 530.318994] QAT: Invalid ioctl 07:50:59 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000480)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000009c0)="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", 0x137, 0x0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x0, 0x0) syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) clone(0x3102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f00000000c0), &(0x7f0000000100), 0x0, 0xfffffffffffffffb) timer_create(0x6, &(0x7f0000000340)={0x0, 0x2a, 0x4, @thr={&(0x7f0000000b40), 0x0}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000000c0), 0x8080fffffffe) setsockopt$IP_VS_SO_SET_DEL(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) syz_open_dev$dspn(0x0, 0xfffffffffffffff9, 0xf1031122ffff994d) 07:50:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trano=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:59 executing program 3: eventfd(0x3) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0xd00000000000000, &(0x7f0000000000)={0x6, 0x4, 0x20000000007ffd, 0x7c, 0x0, 0x1, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100080}, 0xc, &(0x7f0000000100)={&(0x7f0000000180)={0x7c, 0x0, 0x2, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x48, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast2}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'none\x00'}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) mkdir(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, r0, 0x0, 0x27, &(0x7f0000000400)='vmnet0md5sumselinuxsystemmime_typeeth1\x00'}, 0x30) r1 = add_key$user(&(0x7f0000000480)='user\x00', &(0x7f00000004c0)={'syz', 0x3}, &(0x7f0000000500)="fb4b0602c42a260a4df12ffa536bc7fd04cb650db79ce1d2fbe43c2f74d150628c1290ee9d2e90b6860cceee305620a1eba6493c133a4c505a7a1461a4f881587b7d148fd33c218feb4c7f2899a7756fb7b6b05ac7dba0c29c9d6b0762f69be9ed2c2c7e739d3d3c2b47f1b1fb46b22c514644b6834c7dd78873a0d34c0cd8490cd7b4a4881bc5ed1b007b670f8e0c33cf8c83cee3ce47234656339cb9", 0x9d, 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r1, 0x2) gettid() sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setregid(0x0, 0x0) rmdir(&(0x7f0000000240)='./file0//ile0\x00') chdir(0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet_int(r2, 0x0, 0x0, &(0x7f0000000200), &(0x7f0000000280)=0x4) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r2, 0xc04c5349, &(0x7f0000000300)={0x8, 0x0, 0x8}) inotify_rm_watch(0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x0) ioctl$BINDER_THREAD_EXIT(r2, 0x40046208, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 07:50:59 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:50:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranq=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x4080000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) pread64(r0, &(0x7f00000002c0)=""/231, 0xe7, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='attr/exec\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:50:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranr=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008914, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000740)='/dev/snd/pcmC#D#p\x00', 0x617e, 0x200180) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000900)={'syzkaller0\x00', 0x400}) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000700)=ANY=[@ANYBLOB="6053e393e8ee15000000000000"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000b00)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f00000007c0)={0x0, 0x7f, 0x800}, &(0x7f0000000b40)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000980)={r2, 0x101}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000a00)={r3, 0x93, "b0de6f888be2966a2d68f304b42b859af1002247c1c5b4e8c265799b8cbffac60b1601ec75b75cfa6c2a959038c8a50de273c8b8e69b2631f3c1e946ded138951356a863fb289a443af141f7f417bb06754f83dbfe6482e145ac73db3287cfddc5cd3f944d172ca1e51b477619557b200ebee470c98849dac3e050a96dc079b95ba66f460ac8bcbfa1529e145e857d42dc657a"}, &(0x7f0000000ac0)=0x9b) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode]0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000640)='mountstats\x00') ioctl$IMSETDEVNAME(r4, 0x80184947, &(0x7f0000000680)={0xc7c, 'syz0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@local, @in6=@ipv4={[], [], @local}}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000800)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f0000000940)=0xfffffffffffffe12) syz_mount_image$xfs(&(0x7f00000002c0)='xfs\x00', &(0x7f0000000300)='./file0\x00', 0x8001, 0x3, &(0x7f0000000480)=[{&(0x7f0000000340)="7918921b262233e30adb9105fbadab46c2d3a8c8afceba101cd3a704a373f0fdfd4d275f81a9132f031ee2", 0x2b, 0x9}, {&(0x7f0000000380)="5e9ad43751373748503853518975645fac6aa7592cf0a3181adbf5b443074c07125f1f1715b046463dcef943beade5c888d347ba8bd12ca12db90336eba72d9d0bf3cd50e6f0fda7ac77c4830cd89ac57c15fb9c7849558f7cbbe63b605e281cdec32f51eb1ab6f7b281ff7a0aaa5ccd5f4308dec5db8eb37d5cf491d64977dab560a0ead4bea2c9227652bfc4925783ebd7537adf2d268e8838d7be310bf2c76e4d8f0df003b6ce8595dfd14fa3dff7cc8419160f4e27f57e4c98", 0xbb, 0x3}, {&(0x7f0000000440)="a543cf5463c0ffd5f85b811e45d07db18a84b74485b918e117b05ad1a1eb50c37a7fc5ca996cb850a3f606ba3b29fdb1", 0x30, 0xffff}], 0x100040, &(0x7f0000000780)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'euid>'}}, {@euid_gt={'euid>', r5}}, {@seclabel='seclabel'}]}) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$TCSETA(r6, 0x5406, &(0x7f0000000200)={0xbc, 0x1ff, 0x4, 0x1000000000000001, 0x8, 0xfff, 0x81, 0x3, 0xfffe, 0xdacc}) preadv(r6, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) socket$l2tp(0x18, 0x1, 0x1) syz_open_dev$adsp(&(0x7f00000006c0)='/dev/adsp#\x00', 0x0, 0x2040) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 07:50:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:59 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0xb, 0x4, &(0x7f0000000080)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x4c}]}, &(0x7f0000000100)='GPL\x00'}, 0x0) fchmod(r0, 0x0) 07:50:59 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:50:59 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='oom_adj\x00') ioctl$LOOP_SET_FD(r0, 0x4c00, r0) pwritev(r0, &(0x7f0000000500)=[{&(0x7f0000000000)="7f", 0xfffffffffffffddc}], 0x1, 0x0) sendmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x4, @mcast2, 0x7f}}, 0x80, &(0x7f0000001640)=[{&(0x7f0000000100)="bfbee98ba12414ea725b078ca87ce084c31aeb18ffe2b2be89c2a8955238cbda4cff488d8b50317f5b15b31df8a1665c2f91141bf1b4a8c8884bf66ed7192a0c1f5e6ace11fc6ad49581a953e4c8480bb8b482d3533dd451787f84f355e70f9a9b2309e6208cef6e3ebcc6e698b8f4f1264b13e868d85a077ed171893cdda06745d7a1be7945aca55727ded4de3d833d92875da307da6f1046318a6f6168d6b46488edc0ea465f89b38ae9cd61bd7e7f3e3ad06d8b236c82737193f9347ba13cbaee8d9037f653", 0xc7}, {&(0x7f0000000200)="0ab6a9510ec44e89260da41357573e08f271cc7052255958bf6cef89fddd3c0a462768ca221cbff244c49d709a7f05ceb57aeaabc7f673c89ac4bccf50e96e2cac44987e01fb41bcf13f8a55c51722f29a55f29de415947e398cc4b92f5dcfecb213722b1009251cbaa012e3a4fb3c2ea331c5324dd9caf3c119d72d3e9e4db7be2ab269e7aae122d739b14e2f0c6714488c1a826cf049facf7e22cf17f8aad5459c4568505169062a57a98d77f2b456874653eb6ccf8420a7a33a848fcd1200b134911b055e65611b608e09b15d8bfbde748726b0ba3308de82441d884010534fa3f0db09e5d2e0e4c9", 0xea}, {&(0x7f0000000300)="65ef2413225652f7e0356eb74827d1b23d1fa4572507526ce26bbd1e23211491ae4155272736e16c5919d3492e2925e337063a6b909dd4450666ebff9006b4cda10f0598cc4f4ccf90dd1f5c95b4fb3efa7897b71cb8432b091c", 0x5a}, {&(0x7f0000000380)="804a4e0cdf33c3dfa1a14c584a33e6ff3990e082f9b86b921f40a7e18d133a0f15c3b1394a9bafbbb98db787145b7db6a30fe6958a3b31fd7b0ab3c359e6f813d191b11648a851e77cb131a769cbae785ec539a1686ea0f008fa07300a3512ce60d48da0ba536b98d410439c50b294b6a8db0cd30867737fe8ba489b61993b9858e24c1718096f894ebb2825bdd02f2c5df8dd47df344ec33cd032696fb6dc31bf196e00bf9546a58aff76a408dcc7055695239921b60aacdb4b431e2c4856202181d8300e902e9403a7b9b2ba0c7c9868cebae9d61f290664ba1efee0777751", 0xe0}, {&(0x7f0000000480)="296990aacdf87489aa8f54abe9d6653d802cf9d3fa89cecc0ecbae8de8b9207eb16b0c90ec975980e6f8a93007d6d462b3f7e9e96c30", 0x36}, {&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000001540)="59f56309d95d1a4c70414b838a603aaffd0d8ffe61c87698578dc3aa6e39833c80e9abd3e3fa985c86bd41752da2523bb3b9e390c0a9dd16050b9cd03a4bd734c8ab42d776b94da60213f3", 0x4b}, {&(0x7f00000015c0)="01945d01e7abf1cf17a1a274c165a7c934032dafd64c8e0f959db06d7cd6680b5484ce3aa06cd3877aee2212248ff3e1eeaf92c5f1b9c48d8a06d30a1aa732a750d4c6e081348730ac1b414d0ddebf1cdb89b3ecab871ac30437bc17d9807b01054c6817367d4509cad914c1b7b224ce829200d1fcd401fdfaeab018fc8477b8", 0x80}], 0x8, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"], 0x4f0}, 0x4000) 07:50:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trant=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:59 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x7) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x41395527) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000180)={0x3ffd, 0x0, @pic={0x5, 0x79d0, 0x1f, 0x0, 0x1000, 0xfffffffffffffffa, 0x9, 0x8, 0x10000, 0x7, 0xc, 0x80, 0x640, 0x5, 0x100000000, 0x5}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000080)={0x26, 0x10, 0x10, 0x15, 0xb, 0x0, 0x1, 0x8, 0x1}) clock_gettime(0x0, &(0x7f0000000340)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 07:50:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) r1 = geteuid() ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000540)) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@multicast2}}, &(0x7f0000000440)=0xe8) mount$9p_rdma(&(0x7f0000000200)='127.0.0.1\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='9p\x00', 0x1100000, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e23}, 0x2c, {[{@sq={'sq', 0x3d, 0x10001}}, {@sq={'sq', 0x3d, 0x100}}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@uid_gt={'uid>', r2}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@smackfstransmute={'smackfstransmute'}}]}}) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000005c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r3, &(0x7f0000000640)={0x10, 0x30, 0xfa00, {&(0x7f0000000580), 0x0, {0xa, 0x4e24, 0x8ad, @empty, 0x5ee}, r4}}, 0x38) 07:50:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranu=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:50:59 executing program 3: r0 = socket(0x4, 0x801, 0x11a88179) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000000)=0x80000001, 0x4) mkdir(0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3) syz_mount_image$reiserfs(&(0x7f00000000c0)='reiserfs\x00', &(0x7f0000000100)='./file1\x00', 0x1, 0x8, &(0x7f0000001700)=[{&(0x7f0000000140)="d3ef354277a5cf0ab430b7dab3939ef42e7d5d5f95fb0169b791f70b8e117ce62c42ce9b2578d0ce891b9ed22f5d71feee284cbe5f93bc8892f525d617566a014bfee582066385", 0x47, 0x4}, {&(0x7f0000000200)="172f188c82143a83732af2adb8f45f261b6c8a18b99636c23b26490b97dd21a4bc562db4e3c706e12f9e14e871c1d50a7859f15b42a98ba1122cd07923b003167ddebd28060d2788d1ffccf79d685aa866f7b7d49374aa75e5d91598fc8c01cc837f565e032e4509368d0c96954d9bf9f89a88bb4c8df49c9dc97a36a36c2e3bf842c7967bbf64c5272725c2a03ebd21d86edb23708edb408519dbcf1e5bb22cb66827cfe86c21a3daf240539ae76b15c7258d6b64ab27fa491b039fb61ba9252073f3c1fb826058bb6426", 0xcb, 0x4395}, {&(0x7f0000000400)="c7365457014409c8421af50322dc9038cc8368964bc510c9d0529057944435bf5bb4fac4f46af210d9c94712e25be2f12df9acc74a0d78308e919503891a4f8142e5e4892ab106a4a39c37e6127e06726a39f3c414f0d6f2522ce099a8f0e2aa25a4d2825730c2571a561fa64986af1630be4d09990584041959e257dc52b7945bb16588bd866ce95616ea9fe9759732b0a4357956c986ae77753de9b46fc9bbd6d7b68337945d21069e6a00a11291449767a1e6528015b87ac57915bc77c13570c592e0a6af1e37999bdf7768595334a88641f4b20d063314", 0xd9}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="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", 0xfa, 0x3}, {&(0x7f0000001600)="5732a8439403f3665134c62dc6e794846842e06f322940962d85f67e0f60fbef98d48978d021860251ed6c69c65a7d92833c1f05ac421701cd3c112ead5e8e4e40ccceadb8e30be80164a543cd57bcd51ac38c2d19de57f330aea084d99d028f586959c6723e73d59d526f9720a5d0eab22367a214c1a4e1876fb42f4bfd96081ca28c5de17ca36f2ec31d3f4a5743f4e8f3ad538937ffd363ec528eeb9d7aced25f15ce737cb5425c31f9cb0c2fed1261c7c3dc64358485bdf98afd3e7b4cb67acf", 0xc2, 0x800}, {&(0x7f0000000300)="a8f6ab9a3747b3c4ccf91cd3f44f0d01fa6059f0bbba89db36bb35", 0x1b, 0x7}, {&(0x7f0000000340)="72c16273e6e8207da97b592258a8241b35b33e1231d97a542e083048c5cb21ab45c6120989cf9d1b1ac1a718361ba9060b874806e1606cf1edc98d5970becf3ee9a9dea9d4d4bfe743a186e8047eceec89c84e6af4759b083edc2020ad52ca71a69fc4f57bbdc133182f6a532c545ef4c760a07c3cbfef00a4", 0x79, 0x7}], 0x100440c, &(0x7f00000017c0)={[{@errors_continue='errors=continue'}, {@noacl='noacl'}, {@usrjquota_file='usrjquota=syz'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '/dev/dlm-monitor\x00'}}, {@smackfsroot={'smackfsroot'}}, {@subj_type={'subj_type', 0x3d, 'eth0,{selfkeyring'}}]}) mount(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) syz_mount_image$ntfs(&(0x7f00000003c0)='ntfs\x00', &(0x7f00000001c0)='./file1\x00', 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0) 07:50:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:50:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranw=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) syz_mount_image$btrfs(&(0x7f0000000140)='btrfs\x00', &(0x7f0000000280)='./file0\x00', 0x10001, 0x9, &(0x7f0000000900)=[{&(0x7f0000000380)="c10b4323ee5adffb21c877948ffb18eca21f91a2f1412cd21788e825e7674695d5add006dda43661da7892e213e0ddc3a0821442e5ca7bff14df0c12605f250c181a3391d2ec3f", 0x47}, {&(0x7f0000000400)="33edd311f3b51dcb0fe69d743570b132e5d41fc20863b43164bb3b825c9ca932ba58f3f49983e5673f25a65beb670a48ea953818e7a8e433b5d8b15736ac238269fb5977726f009497df9ae162175ff363dc9afe7d0847fd1639a9ac759f08c08db6f69dbc81312b230a65624469c637441b6fded3c535c2acbcbb5cd1e4f4975f4aa950be31564c9678b1e0383cde7887d622426e54b882d6427391b6a694cbb3ceab90099d8844bc2b3bf4", 0xac, 0x9}, {&(0x7f00000004c0)="d771c4f2eb544eca02ea355043c624ba24b14f04af606b78b8feb2ac3fefc7d3c1b163330d888a935bf95670ce8aaf49fe58dac14d75770cfabd690e41c24b7fa597e46725d0b86d30007e000d7cbb4f4d0ef632e084c330515a4268af000f50c4deba0748b536aea06af89a2b896fcef0cd5b8a112e67ca54285be1a928aa", 0x7f, 0x101}, {&(0x7f0000000540)="50c845d7", 0x4, 0x6}, {&(0x7f0000000580)="26109c79cbb5a74753505cb4e3f89351092fd511a8e0fd04c46b6c18028be9f786671267a2846c617b8f7bec3b23dac0c52e373abbdc2c955f44b4568dc83f2c7ca9f121adbb0c791b6822f9f74a11be7b1dbbd6f5adf8b586659665456ca5fba169e3a7f53249cdc68948962f8652eeb5caed5fcf531cfb3927dd08fbde92e183d761d03b8f30d1246e10", 0x8b, 0x8315}, {&(0x7f0000000640)="97d93b6228cd511b7fd587fcd186325a00bda94e9d9a7dcd1be26204d3e2992c0270faebefbfd9f7755500350016dca8d26b56ed553ec79371fc5012dba58ca8e6e93d819ca22e", 0x47, 0xfffffffffffffffc}, {&(0x7f00000006c0)="96c6525fe0c15f1c9ef7aaffc17309e05d373b3cbf6cc92dd09a50a5f002fa94116328a5fdf8f3850a5a9a786602ba25801f71f4863d30c6d6aeb01c19157385de51af36aa3f8bda0aef9e28eb224deaff20159336e76fe1d5a7c0280454de96a64337dd4ad9ed6f7470245f3182a279e3682ffb85637b7069b9125212fc56b858c558a8ea423163c375edf8b7a28d536ad2518e543f3e34eb088319d8d453c114bce3337d434de6cfa3c7a430941c2d0c73246984b8b9982d0ec2e9c84883", 0xbf, 0xb2f}, {&(0x7f0000000780)="6f38575d3f4417e80094885c1c482b876aa4271f300ed7717f935c67f06e974abb68415583cb19c6de23ae1c120f6278e276abb17e545d8b5a92292d486f64e0459adc85beaf29b8ed3720e9900a5d7578b9f775387f049dc6457dfe0bec6ec5b4017575a86f2b9590633622b9484093008d7afc2a320b80c28821f4958ef4a491b6f9d150c314f0d7ebdbc0190e7ca86579af5752eda2135a02bebce0a3c74cb01bc30eb9582f5fec1b23b8b5b0b737009734fcab4e58212abb80583a4674", 0xbf, 0xde}, {&(0x7f0000000840)="5c8ac3150244bd4dbafb550a1f4411c0cc4de009417b620eaccdb251138f2feda91c28e7d4d01625fb1f71955241d839868f8c8b7eaf04aaeb8ae0a49e3d3004460bdce8277eb6b5ba10a13b05347760b6c71ed0f34bcf7e75206e157eff61f46db9ba3a6feb4d292b3f40a226bf5a49970291bf6481edcf1414467ddcd69bf46495f551fa998be3b5cc96ad0bf10929759685bd840dd87858dbbeca57d1ab060ec1316cbee4e3e41ab537768c8518fe00e6518b60", 0xb5, 0xffffffff}], 0x20000, &(0x7f0000000a00)={[{@noflushoncommit='noflushoncommit'}, {@check_int='check_int'}, {@noautodefrag='noautodefrag'}, {@nossd='nossd'}, {@compress_force='compress-force'}, {@clear_cache='clear_cache'}], [{@pcr={'pcr', 0x3d, 0x3}}]}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) mount(&(0x7f00000003c0), &(0x7f0000187ff8)='.', 0x0, 0x1000000, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) readlink(&(0x7f0000000200)='./file1\x00', &(0x7f00000002c0)=""/136, 0x88) 07:51:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 531.396345] net_ratelimit: 18 callbacks suppressed [ 531.396352] protocol 88fb is buggy, dev hsr_slave_0 [ 531.406386] protocol 88fb is buggy, dev hsr_slave_1 [ 531.444569] REISERFS warning (device loop3): super-6506 reiserfs_getopt: bad value "continue" for option "errors" [ 531.444569] [ 531.476372] protocol 88fb is buggy, dev hsr_slave_0 [ 531.481522] protocol 88fb is buggy, dev hsr_slave_1 [ 531.636323] protocol 88fb is buggy, dev hsr_slave_0 [ 531.641478] protocol 88fb is buggy, dev hsr_slave_1 07:51:00 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'tranx=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:00 executing program 3: unshare(0x100800) mmap(&(0x7f0000527000/0x4000)=nil, 0x4000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) socket$can_raw(0x1d, 0x3, 0x1) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x0, 0x0) getsockopt$llc_int(r0, 0x10c, 0x2, &(0x7f0000000080), &(0x7f00000000c0)=0x4) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @multicast2}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00001fefe4)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) 07:51:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="020008003e002908fcffffff000000001c000000040000001d7f7fb9a70002eb814681febc07c7bf6ed290399645129aea06e83162515b0c5e89b65f549b0daa7b9c741384366a80192df67302884ba98e1476527550652ceb9b7ad798bf9ef39ed35b3906a076d516e6acd513407ddf779f101e256eefdcab94cbe36410d50ec69053b998a638a7f91f1bf9c493f6f4bbc678b9f63a7135c8c1d0fac04a2969d940"], 0x18}}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101000, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffff9c, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x3d2}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000140)={r3, 0x1, 0x80000001, 0x6, 0x1, 0xfe23}, &(0x7f0000000200)=0x14) 07:51:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:00 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x12, 0x4, 0x4, 0x8}, 0x2c) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_ENCODER_CMD(r1, 0xc028564e, &(0x7f00000000c0)={0x3, 0x1, [0x1d802b53, 0x3, 0x2, 0x6, 0x91c9, 0x80000001, 0x7ff, 0x2]}) bpf$BPF_PROG_ATTACH(0xf, &(0x7f0000000080)={r0, r1}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000100)='bridge0\x00', 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000140)='ip6erspan0\x00', 0x17b) 07:51:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=.d,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 532.036356] protocol 88fb is buggy, dev hsr_slave_0 [ 532.041467] protocol 88fb is buggy, dev hsr_slave_1 [ 532.085488] 9pnet: Could not find request transport: .d 07:51:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000080)={r0, 0x0, 0x57ad, 0x6, 0x4}) ioctl$VIDIOC_G_FBUF(r1, 0x7b9, 0x0) [ 532.109802] 9pnet: Could not find request transport: .d 07:51:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 532.436665] protocol 88fb is buggy, dev hsr_slave_0 [ 532.441791] protocol 88fb is buggy, dev hsr_slave_1 07:51:01 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=/d,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/ip6_tables_targets\x00') sendmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0, 0xffffffffffffffeb, &(0x7f0000000300)=ANY=[]}, 0x0) r1 = add_key(&(0x7f0000000000)='id_legacy\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)="31880c84b712b00033398e85daea01d2d301886daa305486496801b3a9c87aa61364e99cbf1efccb4756607f3bdc2cfea9a273f378e7b2560257e9b81638e45ebe112b1dc154f84538002a65712377a5589af9e22454b75ae731bccf57cc61d58f2312ac5ee9e6ac3dedea0b2de1ce17adb6108afdc235724e11d6b19bf49fb6f8a6ba4849df3873eac35cfdc4bd46829e755f16d5bae69353c9cbe9cad20bc024647281c73cdb6b86ce98b6bbc36027cdd152aa43c99edfe2ce94d60ad7070bf087faf0daa948002697e956cb6f8e97dd12e332130830ebd767e9e31dbee01327632eaf51f636372454f369961db7", 0xef, 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000240)='syzkaller\x00', &(0x7f0000000280)={'syz', 0x0}, &(0x7f00000002c0)='net/ip6_tables_targets\x00', 0xfffffffffffffffd) keyctl$unlink(0x9, r1, r2) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) epoll_create(0x0) getpeername$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) connect$can_bcm(r0, &(0x7f0000000400)={0x1d, r3}, 0x10) 07:51:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="fa1d9e35941c646c416f012592e38b5f5f0a228f48401cb28c7b451f"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80000, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000040)={0x7, "d63835dd20f23068a9d0d6384c8e10a2b8421929c8d70f4bffd52d4389cbc69e", 0x2, 0x808, 0x5, 0xcc, 0x10, 0x4, 0xa46, 0x9}) r2 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) fallocate(r2, 0x0, 0x0, 0xa6ba0) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) io_submit(r3, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000e4ffffff, 0x0, 0x8, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") [ 532.800376] 9pnet: Could not find request transport: /d [ 532.828096] 9pnet: Could not find request transport: /d 07:51:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="7bf2d48103000000310cf2801f03f763d7d8fc27f8bee788da196b97924e5cda7136e4a5b4e00cd1992dbd3aff890bce9e7bb7106366c216978d525efaecae2c479f80ac53bf140bbd48300a698290d0ddcee6eed62f0a628b9578ee3b23b0e554a5990d287e5adf8dfe307a9ceee3f9b36f67e488920dd26fb9dff446f3a6cc79e527ecb7df5a828dfe1e9accf23cdd9721a66a7ef50300eb1532454e6bdfd3503853b2fbd8eddd9b89583a4d33e3e0474a1552409f5e0d3ea216df44b2bb920971ab9cbcd8193cc3c1483b7489dd9240dc7384be92d71a61bd9b6cb0d36b35f7c0a172e0a30c583257edd8c9f292b4a864ec566d9e4ebe1db50dcd10087f6f3da86250549ea6ac5d56ff6b06b97285b423a4d4b284c4df0e7016f1"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fI,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:01 executing program 0: setxattr$trusted_overlay_opaque(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='trusted.overlay.opaque\x00', &(0x7f0000000340)='y\x00', 0x2, 0x1) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="c7d4001189a9b334d4ec3bdd0e26ae31995ccdfeb80359fb511b522defc919702b5061bd0002000000000000649384240baffebac85d665e5d25a7823145b2fa68ad63f04174d6b03ad03a2756fec11283fbdaef618879054afc7114a9e09b2549e856cbfe85435492e3aae6d84bfec89a105d4d15217b374fbf5b9ea64172cf7a506d8410"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') chroot(&(0x7f0000000200)='./file0\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:01 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 533.074925] 9pnet: Could not find request transport: fI [ 533.096975] 9pnet: Could not find request transport: fI 07:51:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fQ,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:01 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0xfffffffffffffffc, 0x0) mount(&(0x7f0000000200), &(0x7f00000000c0)='.', 0x0, 0x80000, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="f40000"]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:01 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x1000000000000, 0x50400) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f00000001c0)=[@in6={0xa, 0x4e20, 0x6e, @remote, 0x9}, @in6={0xa, 0x4e24, 0x9, @rand_addr="b6a5f30cc4b2633f9e22bacccfca24fd", 0x4}, @in6={0xa, 0x4e20, 0x0, @loopback, 0x4}, @in={0x2, 0x4e21, @loopback}, @in6={0xa, 0x4e24, 0xffffffff, @local, 0x6}, @in6={0xa, 0x4e21, 0x1, @local, 0x7fffffff}], 0x9c) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x1c}}, 0x0) [ 533.357826] 9pnet: Could not find request transport: fQ 07:51:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 533.398094] 9pnet: Could not find request transport: fQ 07:51:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') 07:51:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fR,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x7ff, 0x400000) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000340)={r2, 0x91, "1277551198c9577186f7660c2e0a96ad2bcaebb50b92a6fca554d5f159beb7b1dd6d5ac304a78d08b628fe8608249d1874c92a85395e59ef957f3d283b7bb24818d067ec683c07014b8f6f6b59d13853f0529308c747b035e74756869cf45c696e0751023f983361590802e533e4ab37261aae6b1c9542701f77d46d33e7a2a87d21da559ea42f9c7ecc097983367c3d49"}, &(0x7f0000000400)=0x99) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 533.458734] netlink: 'syz-executor3': attribute type 1 has an invalid length. 07:51:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 533.559537] netlink: 'syz-executor3': attribute type 1 has an invalid length. [ 533.587669] 9pnet: Could not find request transport: fR 07:51:02 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) [ 533.627447] 9pnet: Could not find request transport: fR 07:51:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fS,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:02 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount(&(0x7f0000000400)=ANY=[@ANYBLOB="2d6465772f73673080f9772caa37fafa1189111376ae8e951bb93c4fd88651da5c8c45ed7c16a8c9b6cc9cad56f893e06622eac841cb4ac4cb9f8b20a7a3390635fc397633f130938c2a2fa1b22c086c3d43057b0ba270072de549fd2c13fea8b40cb6b14255542192b8c267170ef8d993c9e6c54eacb7a2806b162dcc83808b7aac1d8448569866cb13069c16d249eab023f38f6481360db8affa67246c58088104a1bf5aaf7c27b37a686d89b006c4f8b7df862688a328706791b484c9576f937dcff8737ba61eaa3188da82571807421d47d98a5e46dfb92af46d42d5f423877a90a89aaec9a0d324a70b133db6d6145276e27db4f17cad96a74ba548bdc84b3949c6b349a81800000000000000000000000000"], &(0x7f0000187ff8)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c, 0x0}], 0x1, 0x0) [ 533.808004] 9pnet: Could not find request transport: fS [ 533.858737] 9pnet: Could not find request transport: fS 07:51:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) 07:51:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) recvfrom(r0, &(0x7f00000002c0)=""/86, 0x56, 0x2, 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000380)=@nullb='/dev/nullb0\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fT,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) [ 534.092256] 9pnet: Could not find request transport: fT [ 534.132489] 9pnet: Could not find request transport: fT 07:51:02 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:02 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fV,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) 07:51:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 534.316152] 9pnet: Could not find request transport: fV [ 534.331463] 9pnet: Could not find request transport: fV 07:51:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fb,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) [ 534.477868] 9pnet: Could not find request transport: fb [ 534.521869] 9pnet: Could not find request transport: fb 07:51:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$ceph(&(0x7f0000000380)='ceph\x00', &(0x7f00000003c0)='./file1\x00', 0x7, 0x8, &(0x7f0000000940)=[{&(0x7f0000000400)="e9efc8806cf8de8b5baeaf9ca1be44fc51bc51fe2511ac00f96eba8c0e2112ac8d0ae7c738b67f2db47381ce41831f9587360fe895cf5450500ddd87c9572733c1f193eb45c5e7c8db680e5bb233d369f1c271d97a71372b1e670e26695fdcb4985c9117e4e3ffafebb10938068601131523e9bac08a9cfd2b1f0ede1a228d76f08c6b9856c328db5702354b7b41c78ad1c4bd8043f192ce7dc8268151d1add92faa19ba60f7896c0f223a2e229300e5b45d7766ce2497b32a923663755b51d9919fb2f440d1eca89c5f36b182", 0xcd, 0x4}, {&(0x7f0000000500)="986e75186d96163810732c13dcc3f1897b8d81618f9e2e5b17f38ebb535f3ff6b37d43fb97a79e0dc0e1e5a42101541dcb3ca70ab2514d944c78a01801da205c0d96287f3e88b61bdae4c3c007f42d592b0a5baa2c0d6c62411ad8c4efe35f085af178e644c36c5a620a69e4e434eeb16901e6811dd48d68017574ab7c1889fab659cc84dfaeb25b19b71d848ce551d65ab07ff0da18ce3393c217f542a1dd96b9a33d", 0xa3, 0x5}, {&(0x7f00000005c0)="10b11ad91ba09a46b125a0548f7570cea756ce601fe8674e37a48175ad66d455c31ea2d906dac71c7cf0155c815076be1382ce5231944a08923835aff55fd52ea63e9b8b71cadcb0a24ba57369e8d0757870114253cd9ffa4d993e43aadbfa409c49411a740dec4187bb63bad543b637f11d1d56", 0x74, 0x7}, {&(0x7f0000000640)="c952320e76b49601372047d9b120f0b759e2b5d6a7cad85b8f6e367e98f6a3ec849022203f28c4598d119659f85a879b7c87a036da49d923fc54019d3dc17287adc8d3ab0ef1205a1cdf0fafa83326f1711c2b553eeaa0ee3d348bce520b9495abec09cfa3435d9b4599f6f294e527328e4b53195db36e40dee477e706b0785e94a5dc55a56fa4002968164c38d1f222ade1a606c10a98e82ac2b170ee9702327edb59cd97026947624b65ae4e17130c90d15f99a8beb5", 0xb7, 0x7}, {&(0x7f0000000700)="9a572483ebb05373abdf5f6a16774ab87dea3fe8fce5d742bc618445325579adcd6ab352840a5eeb69fc7ddaa990c7d6a49c748f261cc1cb6e0efe9bb7fe7f100483893c26146311", 0x48, 0x9}, {&(0x7f0000000780)="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", 0xfd, 0x401}, {&(0x7f0000000880)="e427e6df73f9cb5b515e36c3768451cda36d4ef7f465447a9f0ebb09beecd58ecd8998929eccda23aa550580d6acfd305493678914e6c01deb8c8a7482f2f46ccf05800c7c85eaf9f2478c561963e817577bd1cb7ba0e1eb44aee25b24b0445583d8143d9b1179d998be18494277055f78aa3415d14952fb9fe7a2afa0378ae10080b641b7b770d54d44b6378b4e9ea3f4e84dc47b676fe06c3beb1087d2ba5d819b10942c0062aa7ebeeb055fc2c9b680129f", 0xb3, 0x4}, {&(0x7f0000001480)="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", 0x1000}], 0x4, &(0x7f0000000a00)='ramfs\x00') mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x1, 0x24040) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vsock\x00', 0x200000, 0x0) renameat2(r1, &(0x7f00000002c0)='./file1\x00', r2, &(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:03 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fg,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) [ 534.984774] 9pnet: Could not find request transport: fg [ 535.025119] 9pnet: Could not find request transport: fg [ 535.035280] ceph: device name is missing path (no : separator in /dev/loop0) [ 535.153400] ceph: device name is missing path (no : separator in /dev/loop0) 07:51:03 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:03 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) 07:51:03 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fq,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:03 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) socket$caif_stream(0x25, 0x1, 0x5) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') creat(&(0x7f0000000200)='./file0\x00', 0x110) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:03 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 535.264600] 9pnet: Could not find request transport: fq [ 535.280238] 9pnet: Could not find request transport: fq 07:51:03 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fs,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:04 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fu,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 535.462745] 9pnet: Could not find request transport: fs [ 535.491993] 9pnet: Could not find request transport: fs [ 535.575967] 9pnet: Could not find request transport: fu [ 535.599263] 9pnet: Could not find request transport: fu 07:51:04 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000300)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) r1 = dup3(r0, r0, 0x0) utimensat(r1, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={{0x0, 0x2710}}, 0x100) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000200)=@sr0='/dev/sr0\x00', &(0x7f00000002c0)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:04 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fw,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:04 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:04 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 536.317753] 9pnet: Could not find request transport: fw 07:51:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f00000002c0)=0x4) [ 536.360000] 9pnet: Could not find request transport: fw 07:51:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f00000004c0)={0x3, &(0x7f0000000300)=[{}, {}, {}]}) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rfkill\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:05 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:05 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'sfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:05 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c, 0x0}], 0x1, 0x0) [ 536.606333] net_ratelimit: 22 callbacks suppressed [ 536.606341] protocol 88fb is buggy, dev hsr_slave_0 [ 536.616362] protocol 88fb is buggy, dev hsr_slave_1 [ 536.650358] 9pnet: Insufficient options for proto=fd [ 536.696759] 9pnet: Insufficient options for proto=fd [ 537.156344] protocol 88fb is buggy, dev hsr_slave_0 [ 537.161412] protocol 88fb is buggy, dev hsr_slave_1 07:51:06 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:06 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:06 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="6d6f64659bd3e13d30"]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f00000002c0)=0xffff) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'r.dno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 537.437726] 9pnet: Insufficient options for proto=fd 07:51:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:06 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c, 0x0}], 0x1, 0x0) [ 537.488427] 9pnet: Insufficient options for proto=fd 07:51:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'r/dno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) fcntl$getflags(r0, 0x1) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:06 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 537.636380] protocol 88fb is buggy, dev hsr_slave_0 [ 537.641632] protocol 88fb is buggy, dev hsr_slave_1 [ 537.654042] 9pnet: Insufficient options for proto=fd [ 537.716319] protocol 88fb is buggy, dev hsr_slave_0 [ 537.721523] protocol 88fb is buggy, dev hsr_slave_1 [ 537.736152] 9pnet: Insufficient options for proto=fd [ 537.876318] protocol 88fb is buggy, dev hsr_slave_0 [ 537.881474] protocol 88fb is buggy, dev hsr_slave_1 07:51:06 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:06 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:06 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000300)="0adc4ca83c123f2288a07066435acb0f3a1c19ddf019ec3e99d6e76cc0504a86dcd6dd69e3cccff30a2a7a4840641447b4") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') fanotify_mark(r1, 0x8, 0x28, r1, &(0x7f0000000200)='./file0\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:06 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:06 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfIno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:06 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) [ 538.291649] 9pnet: Insufficient options for proto=fd [ 538.336855] 9pnet: Insufficient options for proto=fd 07:51:06 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfQno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000740)='./file0\x00', 0x0, 0x80000, 0x0) execve(&(0x7f0000000200)='./file0\x00', &(0x7f0000000400)=[&(0x7f00000002c0)='.]vmnet1em1vmnet0]+user#\x00', &(0x7f0000000300)='ramfs\x00', &(0x7f0000000340)='bpf\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='\x00'], &(0x7f00000006c0)=[&(0x7f0000000440)=']eth0\\^^keyringsecurityvmnet0proc)[ppp1\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='+-\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='bpf\x00', &(0x7f0000000580)='.trusted\x00', &(0x7f00000005c0)='ramfs\x00', &(0x7f0000000600)='[\x94${\x00', &(0x7f0000000640)='ramfs\x00', &(0x7f0000000680)='bpf\x00']) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:07 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:07 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 538.514849] 9pnet: Insufficient options for proto=fd [ 538.564093] 9pnet: Insufficient options for proto=fd 07:51:07 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:07 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:07 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x800) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000440)={0x5, 0x8}) r2 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x2, 0x42102) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f00000003c0)={&(0x7f00000002c0)=""/206, 0x2000, 0x1000, 0x1}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfRno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:07 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) [ 539.157932] 9pnet: Insufficient options for proto=fd 07:51:07 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 539.201031] 9pnet: Insufficient options for proto=fd 07:51:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfSno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:07 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000200)=@filename='./file0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='nfs4\x00', 0x40, 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f00000003c0)=@sack_info={0x0, 0x0, 0xfffffffffffeffff}, &(0x7f0000000400)=0xc) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000440)={r2, @in6={{0xa, 0x4e21, 0x1, @mcast1, 0x9}}}, 0x84) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000340)=0x0) syz_open_procfs(r3, &(0x7f0000000380)='net/ptype\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x10000000000000bf, 0x0) 07:51:07 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 539.400484] 9pnet: Insufficient options for proto=fd [ 539.424767] 9pnet: Insufficient options for proto=fd 07:51:08 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:08 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r0 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfTno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:08 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="5428902b49d2a85f2a019b5748fc6d931673230d44534513c1354ddee381d80668bf40ca72a5707f77f67a3dba2eecdbbf63b94f17aa1b2e9f00b9c1eb0c4ffc5e01ab97c3ad0a29a83a278fd2d2dae2224c80289e8eef863d365bf9e900ceebfd3b03b3d92c15beab12eb8c20ef670ab0c3f057b0ed414b6555e5e567f864a17e4a899365ea84b8b87ae9a87e928649658da7a7a3875bb74209b04de002b5d555"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = getpgrp(0x0) r2 = syz_open_procfs(r1, &(0x7f00000003c0)='\x06\x00\x00\x00\x00\x00\x00\x00o\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 540.070741] 9pnet: Insufficient options for proto=fd 07:51:08 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 540.128985] 9pnet: Insufficient options for proto=fd 07:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r1, 0xbc) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000000)=0x7, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r2, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) mkdir(&(0x7f0000000000)='./file0\x00', 0x40000000000023) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000380)=0x4) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="ad047e3de784"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={0x0, 0x4, 0x10001, 0x4}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000300)={r4, 0xffff, 0x5}, 0x8) 07:51:08 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:08 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfVno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 540.350387] 9pnet: Insufficient options for proto=fd 07:51:09 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 540.389933] 9pnet: Insufficient options for proto=fd 07:51:09 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="592b7a9a0b4be9c48b60a3ab91f51227b71b805678162faa3f686e11f80ccfbf67ffd819c59d73bc232a5a0aef68a472de0ec00d7ccc35857b98be8818bbb688197cd5e03aff6c8dfd8f8c3ab9e5991c0ce5a158572d19c9e4"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') symlinkat(&(0x7f0000000380)='./file0\x00', r1, &(0x7f0000000340)='./file0\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:09 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfbno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) [ 540.616797] 9pnet: Insufficient options for proto=fd [ 540.656839] 9pnet: Insufficient options for proto=fd 07:51:09 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:09 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000300)=ANY=[@ANYBLOB="1421a92e6ee9d1b26c7d70926ca6ac68438632f34c96f1897477ea2d20dac020ebbc9f2a30879043bc3bae0799dac598fc54c30927"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='nsfs\x00', 0x40, &(0x7f0000000400)='ramfs\x00') mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, 0x24048, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) ioctl$SIOCX25GFACILITIES(r1, 0x89e2, &(0x7f00000002c0)) 07:51:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfgno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:09 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 541.101865] 9pnet: Insufficient options for proto=fd 07:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 541.146494] 9pnet: Insufficient options for proto=fd 07:51:09 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:09 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f00000002c0)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xfffffee0}, {&(0x7f0000001380)=""/239, 0x3a}], 0x4, 0x0) 07:51:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfqno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:09 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 541.339592] 9pnet: Insufficient options for proto=fd [ 541.397353] 9pnet: Insufficient options for proto=fd [ 541.806371] net_ratelimit: 18 callbacks suppressed [ 541.806380] protocol 88fb is buggy, dev hsr_slave_0 [ 541.816508] protocol 88fb is buggy, dev hsr_slave_1 [ 541.876370] protocol 88fb is buggy, dev hsr_slave_0 [ 541.881424] protocol 88fb is buggy, dev hsr_slave_1 [ 542.036374] protocol 88fb is buggy, dev hsr_slave_0 [ 542.041581] protocol 88fb is buggy, dev hsr_slave_1 07:51:10 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="d132c561a0ffffff7f00000000bb3dbfd42e8b5b716e75d861dcda708ee91c12f6a64a81e18522cff07695982ab589911b055ade548d7a840a71850c45cb2f048a750e40aa4aa0a863286b239bde462b7d76849ee50f12a795d588bfd96da3d25b977bc08e24e41a7b2dfc869734c7bcc5f11c46b8a04eea1e78f6e820e9a05e1d2a05db3498329e17a8a44852f00cc8a22d837f8271c0ad03315aa769ddb956cad13efc4964357ef4920c2bf1438b79fb5731fadaacb93c135d69322a96b435049b07a0cbe1338cbd7abec41ee10e12be34aff6c14826e5685b"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) setxattr$security_smack_transmute(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000340)='TRUE', 0x4, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfsno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:10 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:10 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 542.136781] 9pnet: Insufficient options for proto=fd [ 542.162946] 9pnet: Insufficient options for proto=fd 07:51:10 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfuno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) r2 = accept$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000002c0)=0x14) sendmsg(r2, &(0x7f0000000640)={&(0x7f0000000300)=@xdp={0x2c, 0x5, r3, 0x12}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)="31674274a51370ddd931535aa87c45ae53c8a2921a49021af9277185a7b5733a19d53ce1fca1f1e14654cc6cf2558e0ecd803847be4deca9edb524851383e295a1b21e486e4172ecf5d34a914e727daafbb71b79a7ea27d9a6d6b4dcfa928877254008b0914f6a0128e7e94a2749fe3400294bba4f24ae7713782a09838fa5f359f25ce36124819a6375bdc0031c286666", 0x91}, {&(0x7f0000000440)="dae03ad54c99d0a940d55c", 0xb}], 0x2, &(0x7f0000000680)=[{0x5c, 0x1ff, 0x8001, "093b5f352f1d4d249716f76e46f9543bde1e3e75f541e7d089c43cd9678a53b586f94aa7d9df6322e15ffd0e3616ef11fa395760153fc5aa1e8eaedcfb6be3051100db613f7c4b06fd6377560e0a06696c47ff771ef0fac1ff400fcf98b3a04c7fd20ba4f8315fb7dccd1647850a554e1592488b94d8e7748e9511e6b119ff76fdee4a7ac08260750c4c9a9e82279f39e1d027f675ae934de2fb0b94c40ac9909414fd9ff58c47fc9f29f36442dd6b69e3bc0328e38f"}, {0x115, 0x103, 0xffffffffffffffff, "e4175cc021c6c28c029a4f485adbef136550530ce5068f2ab176ade99f5f37550de901e9e3f132774ef06d1c7186089c169071445737e3e52c57dd36c37a2e6f6d7e37e851e51dd40354a90687e69b3581e7d576b861d23a94a7fd94e7e70585c36bae11e030c7073203ce382f668be33c61cfc1ca1d5efe1f712ad34e3dd4feef32f86de8c23f0b65f95443d967577d46e5782867458ed3b4e040f322a64e91e2689e3172f99db3fe139e"}], 0x180}, 0x2004c000) 07:51:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)) r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 542.319343] 9pnet: Insufficient options for proto=fd [ 542.365105] 9pnet: Insufficient options for proto=fd 07:51:11 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 542.436630] protocol 88fb is buggy, dev hsr_slave_0 [ 542.442150] protocol 88fb is buggy, dev hsr_slave_1 [ 542.836425] protocol 88fb is buggy, dev hsr_slave_0 [ 542.841637] protocol 88fb is buggy, dev hsr_slave_1 07:51:11 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfwno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}}) 07:51:11 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-monitor\x00', 0x22000, 0x0) mkdirat(r1, &(0x7f00000002c0)='./file0\x00', 0x10) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:11 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 543.006721] 9pnet: Insufficient options for proto=fd 07:51:11 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 543.055550] 9pnet: Insufficient options for proto=fd 07:51:11 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'Ifdno', 0x3d, r0}}) 07:51:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c12") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) lsetxattr(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=@known='com.apple.FinderInfo\x00', &(0x7f0000000340)='ppp0md5sumusereth1eth1{@vboxnet1\x00', 0x21, 0x2) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000200)=[@sack_perm, @mss, @window={0x3, 0x7, 0x7fffffff}, @timestamp, @window={0x3, 0x5b, 0x3}], 0x5) 07:51:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 543.233609] 9pnet: Insufficient options for proto=fd [ 543.308425] 9pnet: Insufficient options for proto=fd 07:51:12 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:12 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'Qfdno', 0x3d, r0}}) 07:51:12 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x800801, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:12 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 543.847319] 9pnet: Insufficient options for proto=fd [ 543.870994] 9pnet: Insufficient options for proto=fd 07:51:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:12 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'Rfdno', 0x3d, r0}}) 07:51:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x8000, 0x102) ioctl$TIOCLINUX5(r1, 0x541c, &(0x7f0000000400)={0x5, 0xfffffffffffffffa, 0xeb2c, 0x8, 0x80000000}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) recvmsg(r0, &(0x7f0000000a80)={&(0x7f00000005c0)=@nl=@proc, 0x80, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/129, 0x81}, {&(0x7f0000000700)=""/163, 0xa3}, {&(0x7f0000000540)=""/3, 0x3}, {&(0x7f00000007c0)=""/114, 0x72}, {&(0x7f0000000840)=""/110, 0x6e}, {&(0x7f00000008c0)=""/104, 0x68}, {&(0x7f0000000940)=""/165, 0xa5}], 0x7}, 0x40002000) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='moze 0']) mount(&(0x7f0000000440)=ANY=[@ANYBLOB="82130cbb121b260c62d0c226506ad944dec3b3e5a8e0ae429eb9869539eda2e27bf73d665edd64535e1745054d147078180450e2474911c801abf0eb6c02ffd759bdf3f28a6cba7a2bdfeb131223d4fd721167ab58b7654e177eca3e790ac1d8b01b9d463f80e3f8809fcfa92e1e601ac4db96d0db9efcc3f9667c3026e0257390237714ded102e3c9ef6f1195f290902370f17d3c5840c41eea9a398f7342cda8db977f72d85f918d68365105ee5a6f1a39f04dac5a926122a0d335dd"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) getpeername$unix(r2, &(0x7f00000002c0), &(0x7f0000000340)=0x6e) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000500)) r3 = getpid() r4 = syz_open_procfs(r3, &(0x7f0000000580)='net/snmp\x00') preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) mknodat(r4, &(0x7f0000000380)='./file0\x00', 0x8000, 0x5) 07:51:12 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 544.080006] 9pnet: Insufficient options for proto=fd [ 544.138866] 9pnet: Insufficient options for proto=fd 07:51:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:13 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'Sfdno', 0x3d, r0}}) 07:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:13 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 544.738236] 9pnet: Insufficient options for proto=fd 07:51:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a0") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 544.762038] 9pnet: Insufficient options for proto=fd 07:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000380)='qnx6\x00\xf7\x9eq\x15D\x1f\xaa\xa7\'\xdfJD\xec\"h)\xd5\xb9>\xa1\xfa\x01$\b{\xa20\xcf\xe0\xd2&Y\x00\x00\x00e\x98y\xf1\xdev\xf8\xd7o\x85\xc3\xcdt0\x1b\xe1\xb7e\xa1\xb3\x1b\x16\xb1\x8a\xb2W!\xda\xedY.\x1d\x18\fm\x17\x82\xf7\a\x8d\xb8W\x9c3\xfb\xeb\x81)J\xd7\x1a\x15K\xaf\xe1\\\xe3\x8d\xa8\xad:\xd2\x11\a\xdc\rR\x88\x15\xc3\flq\xeb}x\xd2\xf35\xb9a\xcal\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:13 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'Tfdno', 0x3d, r0}}) 07:51:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(0x0, 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:13 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) [ 545.018896] 9pnet: Insufficient options for proto=fd [ 545.056471] 9pnet: Insufficient options for proto=fd 07:51:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(0x0, 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x400, &(0x7f00000005c0)="0adc1f023c123f3188a07009c9fb8f2fb01cfed1b018a45aa9b6a4935f5bdaffff482a56399bb679f8455a4be20a44a0c18e2b000f7b8af81976c7e688d2553d97d6eb56b5e9a561b63cc9b45432855fe92b2e1b0640c57b5923110643b07e16fbdfc6039264f42851dabdc34eebad14cc627ace98bc0000000800000000000000000000f3b46947a9fdcc7783ae89542fe385ca4e7bb5bd2429735f5f35cfd2d0064cb5056fd0df5e79c4bd2739f1ef591d089d5a33450f38e07fddb228137f85e127b6248d94f2f3") mkdir(&(0x7f00000003c0)='./file0\x00', 0xfffffffffffffff9) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x41e10349, 0x200) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f00000002c0)={0x0, 0x3f}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000340)={0x2, 0x820e, 0x7ff, 0x1, r2}, &(0x7f0000000380)=0x10) open$dir(&(0x7f0000000400)='./file0\x00', 0x400, 0x99) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) readv(r1, &(0x7f0000000540)=[{&(0x7f0000001480)=""/4096, 0x1000}, {&(0x7f0000000440)=""/104, 0x68}, {&(0x7f00000004c0)=""/104, 0x68}, {&(0x7f00000006c0)=""/164, 0xa4}], 0x4) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:13 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:13 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:13 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'Vfdno', 0x3d, r0}}) [ 545.221051] 9pnet: Insufficient options for proto=fd 07:51:13 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(0x0, 0x1ff, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:13 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) [ 545.245378] 9pnet: Insufficient options for proto=fd 07:51:13 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'bfdno', 0x3d, r0}}) 07:51:14 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:14 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) [ 545.432925] 9pnet: Insufficient options for proto=fd [ 545.452223] 9pnet: Insufficient options for proto=fd 07:51:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000000)) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'dfdno', 0x3d, r0}}) 07:51:14 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:14 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000c00)=@mangle={'mangle\x00', 0x1f, 0x6, 0x570, 0x1f8, 0x0, 0x1f8, 0x2e0, 0x0, 0x4d8, 0x4d8, 0x4d8, 0x4d8, 0x4d8, 0x6, &(0x7f0000000b80), {[{{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xe}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x11, 0x80000001}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @broadcast, 0xffffffff, 0xff, 'batadv0\x00', 'bridge_slave_0\x00', {0xe401f8e40f4e2cbe}, {}, 0xbf, 0x3, 0x21}, 0x0, 0xe8, 0x110, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x3}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@uncond, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x1, 0x7fffffff, 0x3}}}, {{@ip={@broadcast, @multicast2, 0x0, 0xffffffff, 'ip6erspan0\x00', 'team_slave_1\x00', {}, {}, 0x67, 0x3, 0x8}, 0x0, 0xe8, 0x110, 0x0, {}, [@common=@osf={0x50, 'osf\x00', 0x0, {'syz1\x00', 0x7f, 0x8, 0x1, 0x1}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x7}}}, {{@ip={@broadcast, @broadcast, 0x0, 0xffffffff, 'bridge_slave_1\x00', 'yam0\x00', {0xff}, {}, 0x5e, 0x0, 0x4}, 0x0, 0xc0, 0xe8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xc}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x5d0) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000200)='/dev/dsp#\x00', 0xfffffffffffffffe, 0x8100) ioctl$TUNSETLINK(r1, 0x400454cd, 0x33f) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000480)='bpf\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r0]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') syz_mount_image$nfs4(&(0x7f0000000300)='nfs4\x00', &(0x7f0000000340)='./file0\x00', 0x80, 0x9, &(0x7f0000000a40)=[{&(0x7f0000000380)="d80167dfcf4cd650f05fb599c663a9a647d8548db1d56754f1de088ed6c764177cd17deec21620db35ac17ab90e942ba5b78155648c180ca9ed291762f6cb92e3f5cd0817904c6ad364488f1df553370dd3dd9149118bfddf9e3ff3320b21129abaeee786f003ddd4b8a6a30131cb9fd36e238faf6ab76f0f7cd735d9dac3beb7fb45c14e24388c1a885e75738f00b4fb1b29da7c1820c5bb6c43b8bdc6357fbb757d74dff46674e3d9a78fedb075e16aca1403e7810162c0faba62d8f0ad777ec009148192ccae7f2dde954aacb8da6ff6600034c7a7116052c81a3fa9ef0ee9c920c", 0xe3, 0x8000}, {&(0x7f0000000500)="225af26fc9c56d2c4ef5e537c8ff132d1f5530ae34513ae6f858436ed72700dcd468b9804bc5040cdab89b479dc5c430686672f60d08cb25bfbff062706ce79f241b642af1b49fe7ccf4271dd94756bd0c549fea0e9bf8abedbc4c4bf1194878cfb395e155e2bb6e6f726fad897563c96f8706edad77838d83ee950ff122450aa383c59bfd9ca58d153e01b7466ec7238e49ade397d76dd5514deae94c9e2a0f107f37934c2f4e0161cbbca610a874e46da030eff580337d861e9e3c33d66568bbde58e25b9cd4e364fd857a0b7beaf00ab770a9e70aa377afb2a03564cf3541bf49e5b2a39285896882f8a74fba37c4fe2763403472f83ea3", 0xf9, 0x1ffc00000000}, {&(0x7f0000000600)="0c263f4430579fc54877bce0b51f4d26d9f2de9f158bf08fe8538cbb22b0f5f82b674624bee2f8c68dfcdf2dcf62bc75cb8014827e6d5e680794cebd2c59410c1f6389cd9cd1518257ee57cbb74e8341da37c14125fc03e999181abca55450db01213c146065c095dc9fae48231a976ee2bdc18bba45c35f0d3e0f2a2d192d4dc502043562eb4387edf9b11cd1079b416d7b8a67a3351a37645d1a", 0x9b, 0x10000}, {&(0x7f00000006c0)="97d11789bbdd15597cc9ae76ef1cb0c8062779f2ea98995439a0100e2dce94c59546fb981f330a851acd070490491544e4a2dad10575abfe0dc4b5a78c1f05992326a39803d82cd3eefb34656600a768ccf144a02c371270b40a7614f3d11ab9c0affa6abfabdcbf5c928b5cf2e3743f8b98a6dc60c17597e81435fac7193156af2cb8003b8f801bc6f927e1f8bcb05f5189caeaa477508af85c08bbdbcb8360fdef8463958838c85b1c48dd9f2c8d326e4669be9b3e", 0xb6, 0x32980000}, {&(0x7f0000000780)="34cce9ac453a12d60384", 0xa, 0x1}, {&(0x7f00000007c0)="97bcdc7c82b0dc9be233e7c99c44568d6125d16e77919f103b569027c3f5534db4f3d499d53736328df60c62575ccb53f37eba1b26acacbc12a553581a73e31d09a30355e40d12aa0459ab8a203b75d502684e6209db408ebe85b15b17b42b55edbb643dae09df6905a036d62a82e55a213fcc993a47baa74d7efaf456e70d0fef372de83c52258e8095b502093388975449a11b7f10e5f96b95274fa1d75feb2d412414979db475e7f8c7c7d93d1112b1584bb1804f58bd1d046b91e1094f621ccf71d14064acabca747e4518e2493019a5dc3b", 0xd4, 0x3f}, {&(0x7f00000008c0)="ffb1eaf4b57781735900b85404df71bd8a0d0cb236581f9d9873cf983fe4e77a9b279a1d207568", 0x27, 0x6}, {&(0x7f0000000900)="61c617656a61939c094be56c516663476a4809a2be94f5f48e9ad1d2ac309edf5ec49446d5a5a24ba05024ba770cc4b74d885460b5ec0b9977c07bfc88bd33e168b9803379f9a8514b78fea4808dc11a374565fed5e24178788f23098e53c08ae6be02f7b242e66d810fb6a520d6812b9d7a5f", 0x73, 0x4}, {&(0x7f0000000980)="0b4bc402faacb08b28ff96cacd4c876505019c7e9c467d0831ad7b82ede3f5542021f4263a2aece4e7d3f80a604baa2e65a5b806300d0bab7c17e217270349bf4405004a3c0a05b407ace865f4fb44bf3b991112cb1ce6120926ea5d50b74cf05a2770900e498dcad6fa1baaa09137de06e45dab37791efd5630ea6d73abef07b1ce6e97b2703a96a65327d6aca0902f6011eac7ec9bd3b34fe14f0ed8e42602a7ee282d31e6a8", 0xa7, 0x34987147}], 0x800010, &(0x7f0000000b40)='bpf\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 546.126223] 9pnet: Insufficient options for proto=fd 07:51:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f00000002c0)=0x4) [ 546.150640] 9pnet: Insufficient options for proto=fd 07:51:14 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'gfdno', 0x3d, r0}}) 07:51:14 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:14 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f00000002c0)=0x4) [ 546.315514] 9pnet: Insufficient options for proto=fd [ 546.391731] 9pnet: Insufficient options for proto=fd 07:51:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(0xffffffffffffffff, 0xc0045540, &(0x7f00000002c0)=0x4) 07:51:15 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x4b, &(0x7f00000003c0)="9c34f15afcccdb85924abf0c4756e83eb08a199c2f24f83dc60f606dccb752e9f15c49df0fd32301a004be544498c27ea720f0adaf592ea42c85d982972aad95b77c086749dd3eef4d2af4bc89eb58e2696c1a423d998148b6ec46d557c716236816f4c0577eca7bcd30a343d13922cd89a879e38e7a4b81ff647daacf73f181094602e4714460b9287c07f859f0cf6e64f38d3d1c8eed1fa77b2b44bddde6dd4cad37048effcfd53a9f8f05e5a234cc234c037da8fa481ba52e4acb40ccc48524e7ba0ada2ca86195b30060869939ee077b2eb79cd24ab5d20553eda4311acf7d2d9a07fc0f520f") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r1, 0x80045700, &(0x7f0000000200)) mount(0x0, &(0x7f0000000300)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'qfdno', 0x3d, r0}}) 07:51:15 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, 0x0) 07:51:15 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) [ 546.610089] 9pnet: Insufficient options for proto=fd [ 546.633723] 9pnet: Insufficient options for proto=fd 07:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000200)={0xffffffffffffffff}, 0x106, 0x100b}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r1, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x7, 0x10000, "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", 0x7a, 0x1, 0x5, 0x3f, 0x9, 0x80000001, 0x10001, 0x1}, r2}}, 0x120) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'sfdno', 0x3d, r0}}) 07:51:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, 0x0) [ 546.863662] 9pnet: Insufficient options for proto=fd [ 546.884867] 9pnet: Insufficient options for proto=fd [ 546.996358] net_ratelimit: 22 callbacks suppressed [ 546.996365] protocol 88fb is buggy, dev hsr_slave_0 [ 547.006427] protocol 88fb is buggy, dev hsr_slave_1 07:51:15 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:15 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:15 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, 0x0) 07:51:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) utime(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)={0x9280, 0xfffffffffffffffb}) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:15 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'ufdno', 0x3d, r0}}) [ 547.225909] 9pnet: Insufficient options for proto=fd 07:51:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") r1 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000002c0)) 07:51:15 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) [ 547.260590] 9pnet: Insufficient options for proto=fd 07:51:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x10) recvmmsg(r0, &(0x7f0000001880), 0x400000000000036, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)="2e0000001d008103e00f80ecdb4cb90405c8650407007400000000fb120003003200000040d819a9060015000000", 0x2e}], 0x1}, 0x0) 07:51:16 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x8001, 0x880) sendmsg$kcm(r1, &(0x7f0000000c80)={&(0x7f00000002c0)=@in6={0xa, 0x4e21, 0x7, @rand_addr="da0feb29fa4654579e117990f2b0572d", 0x2}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000340)="72c5ef92faf32c80c2cdbc618dee719e5a3b3eae55b54bdce8dc415ff5f5783a580dac31345ac1526dc2948c85c5c1b7eb239e5a08e4c1e8d75cbe0d6bf97d4cd62fd51e13edefe80eeee9bd136714a238ea15e7a4666c11cac11797ecd6a3aa6a7e3fb4", 0x64}, {&(0x7f00000003c0)="857c9e76f328189c539915d78f32237a7bdf1a95aa5edeb74dae53dfcdf3e509a490a556c281ee859bad1c4d207e22c85ad7c7ea14668863316b4f7df13249b58e48eedfad", 0x45}, {&(0x7f0000000440)="fb0a4135d4a50283f7cb3d575c1ba13cd42d9e5684f176783497ce4270eab1c378742e6a2828b27bdc43ac617a0163c69f168bf6c6de9183d0d58ee3d6aa009a756024d25e77c3cae8ff32d2d18e2ec9f8e4f0d8e80c8c0f128d84e962e6bfa51159a26cba2396cba259d3f182001b93f34334e5edb493005fd653255a7a5867811b1161", 0x84}, {&(0x7f0000000500)="2b90ed7ae94168f8927d6af7f6a9daca8839b918b991f541655d98345da6fd8f3214aa2760310067f60f1422baa64bc7446e268156de588a5b66a2c8ad46880b5eed4a8af6a1ace3f46de269472b0e2218bf935db25d56066fdcd4a8b726392fc6f5b3c090fdc64d17b9cf6c69d9b3d96fc026f37877967b3fe01099136649b04a61", 0x82}, {&(0x7f00000005c0)="777b3898313579564379c2ccacc4b5ef83c2a27486f3e4449eec49b3104739474a6e34c37b305044f7c91fe0502ecccc63cd2bfa4dd34d74312a6e00b69e472b30bab4f3b0dc40362455d2df4d52bdd701300f5c14f0f1e65ba93d5e884e9f2947c3edef816d87f4e20f5dab87a7ad3096440326e2445dff10a601d42fe4141f289b11c4d1e2", 0xffffffffffffff63}, {&(0x7f0000001480)="5ab85c3a7b16753095bf96a3f7fae9a60107c3313f8929eb9e7ca5d82288c7589a2a10f4e26688ee207105514a53d00f5c97a42d4b67e04bd4d1c4b4744ffae2a04a5eccafdf177b676d9ae09181c34f10d00bf01c526b1e57d452450caac7cb132917d5e39c7da465dbef4fa4e4530e3f20ea39823d8b644d3a25a95f4f4d71898f35c60000e1ae8f178b31470c098866f33eacc759604d6279f023dad3b23783f5ed44b59efbc938f4cf71987d70c31a927ab71819e033ec305d669c503fa67bdffd48a47ef471c33faffdf21214db27d9caab8baa1af3a36ce48ab24776d7d12271f557911014f8866664afd8af1d948b39ef33092731fa0ba33d6e3b23dda22ad2a9bdc8eac929368724f5b44b12e624a15b6d4de8045f5fb77b94d0e3f633101950b528eb10aa438dff7a8f43eaee66cd69c8d3e98909b36549852f4185a25cf77a8170c25aa43b52e0c6d521f564cbda4c4799207f73faeb04d7872b9d199809c409d5e4605fbd32eb7a6950c55b453ec2fc44cd7d0b5ceb03715e8a9fd5848e10bbd81ce3eea9a1c8710d95d67de87c7f51f6a18e9284846e9b8e3818ab7fb3d10979b6b754d155c5cc92f9ec674aeba004469bc2164fad9fdd0156249c8a52a1ab909077ae2b116dffafb78957c54186362af66fa95b71e57748568e9ef4858e607a2ddc9617f3d86ef6e563208532b92f9fdc7e49bc0296b5f4cf793d75db68bb006cf55df458768ae26d4d4ca2e071f1e9f8a57d1de664642cd9a0e4c572f319454f1814bc73a86d7b2b8c33919968f0df6faefe9ac4fb866f7152489aed7416f86a2e8d2f96aaa68440e787778bdc8fa0995d6c680c35cd60f87baec1065663bcc9b63e0a9de2ffc12e2ca5dcca484d32c182dc0595547441c2eaef6b3a20288533edef11ad3556416de7377ab1da789b23f0b5b35e15176bef3520dcb42c5f687109fc2c6415ef5edd48e9b66fcf2474980e8ba716626f935e0d157f1fce3d81ea019e059f5183310f964487c4d4de36f4deb1d4d470bd4d2141188c8b418618d98586358db8f280d1bd82dca04de7c1c88f56873aceab202e69590ec9e8572b681473182d9a1426b7ea0bb82cf3819c335825bb5bf4c6c989e82d4aea85f0e55abbe52d1bd8767907007aae71fd9d3338f285f84626efe352fcaea587f0fa00f4683564ff74d3358d06dd828a217d3e2a6439306d04e5ca62e2125a2148a47a6ac393f38d01ea1972dfa0501d73a34bc02815f68532b2e2b7623dbf2d807139436bc66a040fe3b72cb050bcd402f3120f3ca1545a336597c610432ef4324b3af6c72c089324eb38615401fb28fbc57fe7e503e7313c9d1afbf7e1f37b78a508d4f8cbbd9291cbc058b95353411c130afff65e890910b00ed0e41ad3987fadfa1ae388529c467e53239e29950cdc3828a66b090ba328462a987c3c35aeaac79e781c60ab4c0760a40c95b344afcd2ef3ee7e6420b80a9b6b4a53745e59d7841213e28337285aa47e52e0ae6fd020afe654031756139221cd07a6f4003dd277cb0fcf0978d0b41dd4467381e15eb68fd67f3e2437fbb468a3aeca7bb9eb4622ea33875992a6f7e65218af85f2cb12319c20e7e17a57f22dc3ba57a4124436b8f364d4e4899ef2adde6feaf3d6281d60e0e841068b668b7f550a754b3e31ebfa5e409c6c37fe01b7a57f4d87cf0a84d2e498622f383d6184e4b4101507518bb78e3626efa1ca31fdcb47a1d4ab3cc9ab668ab1fd601207d38eab48248d746aa246f8ee070bbf60521df6085eccad101bd0ebcf96e668b4b26d88447bddc16b44a931a2986e20938724728232ab04d31f5fac03c4770ebc9abfb22215d312ec4f19f58c8403723c3caa018edb3833370e78f0c4b658a8e6a7c6bf6b6c3ab15738896cdb38a50f0513f28a8a83954d2493405b655644467bd54b3d9f824ac9b6e2f8eaf25652d20fdb208eba82a7ad6ce256425942b4876dc1703b46f96f77bcf78c580515fc53ce6b35c43406160fe269f1e5e9cc2baf8ed600da1e8f7bc7221e54481da605ff3ac00c5be8f7d55fae2925c27accd93ce4cb1a8891a7a817aefe3ca82c56bd3a277af7c35460327bf5d778b74b1c74d37c13b42d8460012bad02eed2511c0270f6beff3efc04f990687cb1829943613e24f8192d393653fef84b119717d72a0a54ed14c28a3fa3d887eb2c8f358acaaabeae831c5375ae23aadbf45777c15609da7cf378057556ef25f74e0f53168d14224b0c8f1c6173b8e032285b7916539f2639cb65e8007917e97fdff576e6dcce552fac6ec7bf324014c20b5dbc11a34ba71fe1e1f1e43118f7a9d0764f130f5c6d7a25740319dc7f317ff538c6906b0e2ceb1450eab5ca9027a24c8f705c298e749b73dcb93443e887ad79c1ef629ddfcc631d735cffee3257f89e926d55a1ba68de6fd6d6a2e31c81985dac1b0c73d12237e3c90e8473ba494b1e2489a6aeaf68eb354f6866a46934e83b4d9cd4bb67815b829f215b881e8c8dea30d8dc828def4bc9758a3a36e48bc6bc4defd14262f6ca7767b40841d7d1dde474c750158b8f39a124d892902f901621537ed654fba789f524f0ffb177ce1066a555d8d35edc68283b9d93eac0916bf03d165ed5ed663f4115eee80e84d3b11ef8f25f7f075194c20fe0c5c2e45c93b1828ee40770557aa22ea172c4055f746f0f21341f5fe666d203f6c4f61e67109f5cfa52854b98187cb44f3c4d138daa70b9ef1f3851b6f2ab7fbd246621c9b10e27c8156b2ea16626fd5f4e81687bc709de1734a918b518a0bdf5a7c8a4144fe390e9bf27b095886c2a597e4f4ffed7dbb6efd093e19293732ac37efc2fb1d5a4243a85fa7c1a9eaf69557e7686d226ce251ac7844a3e8135a12e9d22aa3de1d608d6dedcbc4efca6b26d609ae40eb089361ac90d262e1153090f5c20f0d60e8511cb848b3c0687fcf6850b0d850609cd6d6ff3aad10f5cb77a84f12b5e79bde2b7c15849c91ddca724409624523d43ee8980779dfae5806d7a4b42e707d0e54835d01c6ad3f465564c4e849e49d08822e60c598fc51ed896f6a350966ee153cce6d0783df9dcd9dfd7794db31c16b61ff2738866a796a5a89816c2f42d46b606e9d042be5e8b81579380363b4fa1a8a6850da4e4c15e4dd5edbd918f962b8625c5f0ba80503896f992a127c0c04ee4c532a3f91c952abbfc6f4335fd81cff410a1465adec0cda7e45ddf8d0e23d2fd65148163146e188e7b689d9866fe344be7bd88b7a751ad5bf492a01dcf7aa3db74435d7798449abed37d54507c1c7d6b5da4438e9a305d12db618d82176a3bf5320fb77933f4283bd6655c2974426e42566a422b5b2b2c92fbd9d60d10b7ec64edbb9444e63914e651315f767bb018fa91de5bc3da94c45de722838d1ab8e4b45a1085e5a8fa0c968a2edfdeb32f5ff2dba1bd6054364f14fd86f554c7657e47f822bfa3d6196204147c6b630e458806f436514975cde7d8bb97812547c8df64aff8484f490ff24d903759431b97e3532a34691414393b007c775f8197ee0a9a9646fa0f1a66b70a9af056984627d1ee41c0852944b5ada7704cab90498b2b3faeffc17fac95b27827a18246afd7d4e1252d2aec92b6d53e8cdbb71f01e2c63d2afef131cf5c694e18ea3a69c2e4c9866b5e0384272ecd07e82cfba3a07bf458214c75d76f2dc4d03c9edf89b2c940e01a6d95b2f64e93d7a52be4d3b046683c677131c67699ac62332a77f9b84d98c26cc39970003435bb98be91f95b8960a131aba769e909a51867f67fa47df0c66ac525951122af81098c0f39ed64b9382d5f4b9467326492078f827820b3412361ffba7a086df3f5092955138fb64b89779075adef435b4e545207d9682c17ae289a7f15b3233e75499adebbf88ceb20053a378ef8da3312d2f71fc7f6f07841d78166be3709f64097e2143e0ab55cdef1e0b448ecd1db5b563f860fa0be904231287e417fdd3716090ca7d8bd9650807b6632d10eaef004aa2b496d46b62c69eb031ab9718208f363e0b912fa2911c88fb90f57201952eaca762c62f9246f6f04fa68a753973cd4a82e1c2ceead85c6a5f49bd0aa200edd0e4043c44bd1e4924ff9ef29d91823f4a1f5d44746735b280c06ca3b32b49bf30839ec0e0e15d8f5be46743a429a471b8079f479960eb9e6f97a7d9ec9054aeb586ee938ad2fd2fb8f97a177f0935ef68ee0658f88d89fa5101c93ff614182d9473a88cb8e40ce451a55eb38888307b83577d694f42010cb08381f65bead2fd4007879bd6e28ecddfca6f797e22f29470f59ec748e5c6fc03af9400a95516bfb55134d784c503d62d22731fdbeb9b8b316edc0ab56689df4f12971ce8b8fd085a64166eaf35579a4abb0d047e648eaf180228bcb0434c0c7ff32fd29d3d839128e5436525822faff0a4f3e399cd5c7fa5a1622bcac8550ae1d04bbe754e84ab4fb49b062dbc58266ecd21e886360f54c69e9f762c62d9822bc4eeb21f83582720d8c2f3d092b3ce2946a0a4f636181a2db353490ae890931170bbb4ca96f5e18581e597e2b5f4e990067102f95189822908352bce9f4980e6301c868ed8940c02ab8585e47d6716212d4b6040096763d7206cc812618a17076c6fd552191281f1f2cf67a12e5e77b912dce31886d2e38600fb167212860193d483b5eca47c230d692d10d28d07fd0c0f574497788477424aa27dd2e97d9b5f247d5214119080d061dc729d76e16c58e713f24f1c9051a2085fd5e77df767edee23ec821195bbce89fe982bc7d76984866f03533ca18d0f4a2924107b400ebdfbf982a0a77311d39e125c27b3cc781d79c453bc58cff54c0a3226ef82c46fdcc1ea42d365365a078b3563e18f2978326d6085da30029e652c79e2a661af4cc9ca4c22a68b64c4b1907972eb51ef90e2b80b20fe3e5440646744b472cb026f48e9b38ba50a3f5a662d3489e8ecd87e808532aa281117ee1b5feff9ed1a3ff7d69dc10e8b89b897f775f14db97ff0e5fb7eb003fef69ada99914a58c89cccbe1f50fcc9736d35886a749485f96f424f0b0dfbf2cf2283e50113c215ae6c77590ed53f4d68bf9628eafac76b61dfdddf30bde805da448d23d84ddb2bb49e83a1ffeaed7fdd1219d059299436c8763bd7225d57921f84b616b16d51478de2b3db192897086869ec56de4421bdf914517d31311bd56e4c22b470bfa8c7c2b1931b9ab486ad0ca9611a695278d15c471d0f1ad9c668b752044e5c3047f5b73d9b996b52400dc35dc13b73a8919f74c611afe1bdbdd5e0030b0a6623cc444b306cc1612e76707f82e9a3f4ff6d6260dae1712c6ad249b1b46f05f905a360ecb26f04337f37423d703838b6ee53b09ca0e8693e8732b73493a3e64b4abf0c365a030256a7337a9af4d8105c8f393d1ecd766cc48053e61afcff5e90afa0531542f0287f17948adb532e96808699a6930572a8864a357f46c0137d4947c2d9ccebe6d54ba0833a1efcd68f2697b57c4a03163cb4dccdf5f6a005afd1443016495e77dfbbb61344468bb7c38fde8e23c485dfcfda606d2e70ecd13ea180b1f49776afa091be832fe6fecd03165d22364ea42dec02bea6d5c9acfb0312b938605f53af0afd3eb6588a4d0dd2c85ac863bd8e97102fca65934a74ead075acdca20ab4d4df9beb405e7d6314eea8887fe3f807b87a4b358222d93f7825ae37164ce5354abe4316bda5aee80e76812e7984e0162aa161a3f50172401ead5520d10a224beda2238ab9e94299686586c4bdaa6", 0x1000}], 0x6, &(0x7f0000000700)=[{0xa0, 0x13f, 0x6, "05a57558bc539894ffdb170adb1c1bc9be34149f6708086b0d30d59364748b1090f581ae34a958c59cdd1d243fba48230b9c7702060f07e1916c1259da1a631633c38601465da39758b9d82eda7a8d266ca60b8d741f43c904beede9519adc5de0715cc3968ec13c46545e05e89b45d747422a550e178e6d4d2461dd6f02e83e7d37d542cb6eff0d68b3ad16844d"}, {0x78, 0x151, 0x1f, "159a038b6d2ce0d36cbb924975ac5b65c321600b7b0aeaaa017959e415042958b23432ed1d28edc4a59d1882718728402345588198f6507b3365aa6c92420c28bbf9603a1b1c86f437b8255f6b045d043ebcf5fd15099ec4d93ce894308f8dacae75c1430d24"}, {0xa0, 0x18f, 0x7, "1bdbd5f50406b3f26164bbef1f4efe4f3ff3cd42c08285a212d27993c3be0790e8d54bce5a355a246dbd65cc0388977664f8708ca13ff59ae0f3b9f7385a5e197c13e529ac91fc4c8ef8c75b41caa823284358550f14f70e8873202f47528ca98f495f1745f140c42a90fbb4a8180e1c3d35a4b03494d066dc2e9eb1efafa94f61523ed734ea86ccd394f5e6"}, {0x50, 0x1, 0x9, "39dbe4d66ec26313410a5e543baee757d39e69be23c660cc3c493e7a7ad77b33de2b087aee6b37725f1d5a7ac3bd74d7c9ab08767d6331d21844e6209b"}, {0x108, 0x11f, 0x5, "298cb0ab51387baa03fde0cf13c4c5709270100833532919663bb772cb841715221e8d9c197d56fe7be60a5bbc5e17ed4c4163c765063a8e4f6763f4b717128f9545369054b6fb69a524126bd126c68034cb4f1c1428a9a51a92f4ebc4531a533059620685eba0da1ea881b85b8169e495e08ed3de651ce7c4ede6786cf5761dff7a96a3f5c3acc718ba1f3ee1c57a9b9889c76e19d9e8d3573f48d11cb23ba3d8486d9bb00acac90d659416c5d97a472a642c4ecd1489e305e0fe1b25ddb1581eaddb2daf4c65dbe7bc35ac0aaaed625fa605782566b5d88f15c1bc01d042f6b976c712cd14e1620598f7fa92b7a238ab15"}, {0x90, 0x103, 0x9, "573430909d496334742330903489889f85f273ccb243f6b4eda7e1486ca8da74bcc9c23d6640474253ff5c10e406889d4b5fb0e172feeff5cc623dc166cba92f58691ec1c54056aad55b9baddc777e94f249754d4ab4117343e9eca8babbf710c177fe92d56cb6c995db1d1f67116a8d79c7fb2b188d2df6f97d77bc"}, {0x38, 0x11f, 0x6b, "38ef7a192fd2f42967b4ca3cafee05ed99161f9f0856ef9371a1715f384fafd5725ba8d584cc0165"}, {0xa0, 0x11f, 0x5, "98bcac0b4939542a3ad4c0e192ce0a7402d90e6a301c4cf2fcebb28df0a1b9213e75d115c4ba72f195a1a8d3e81479027cbe31c458d7cf2e7c3e6f0b400ac5df79c011f7c55e44df9627465aea199743d1a8a7b86f220a8764d2f247c34c534009fc82712fc523142798b154632800359d849ac105107433d98f0efe1aaf9183fab6e50f90edba9dabbdbe774a4d03"}, {0x2d5, 0x0, 0x1000, "a00b449d9baec8f4b70e5313fdb06e2b4e6721caab51bbeed2f28108a7a1367d34881a15e07882160914005539d6d44f819da9c101842dbcb3d38aac72404b7f0f5e666248e0631d6f61c15ad7146097546a587303bc1a478bf12c3b73288daed92ee6d2865075e6888bc7d9a63f2c3b6ba764f60aedab7f8099f2c1a649a057d43a7736c4cd20c9f2c88a6ffd126d97833c545eba920912cd105e95d6252c3979f04184c584cc45cb96596e9da8a9c368d4378ed8d9685dc6f2f5e1832191ee46f33618c9e4a9ad8f64ed1c2cb575"}], 0x558}, 0x20044041) mount(&(0x7f0000000cc0)=ANY=[@ANYBLOB="ca9e3a3263486f26fdb7694ef1bfa8a5b6345c695948a00a30e3071292023125f1dd188ba7be1a80e8cbf75276710bd5763e169fa17d7ed906c882c6c58366892f255a4fb7c91301a8dcb091b34bae0391d057a715e25605d928d11021cd4a56db3af73b52f6e2fe9edda2dc81083e96087588816543e2e9385118a638541bf996c3"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'w.dno', 0x3d, r0}}) [ 547.548251] netlink: 'syz-executor5': attribute type 116 has an invalid length. [ 547.556344] protocol 88fb is buggy, dev hsr_slave_0 [ 547.561451] protocol 88fb is buggy, dev hsr_slave_1 [ 547.584126] 9pnet: Insufficient options for proto=fd [ 547.590239] netlink: 'syz-executor5': attribute type 3 has an invalid length. [ 547.605970] 9pnet: Insufficient options for proto=fd [ 547.611449] netlink: 'syz-executor5': attribute type 116 has an invalid length. [ 547.632180] netlink: 'syz-executor5': attribute type 3 has an invalid length. 07:51:16 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:16 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:16 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'w/dno', 0x3d, r0}}) 07:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x800000, &(0x7f0000000100)=ANY=[]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000200)=@md0='/dev/md0\x00', &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:16 executing program 5: [ 548.036344] protocol 88fb is buggy, dev hsr_slave_0 [ 548.041558] protocol 88fb is buggy, dev hsr_slave_1 07:51:16 executing program 5: [ 548.109178] 9pnet: Insufficient options for proto=fd [ 548.116337] protocol 88fb is buggy, dev hsr_slave_0 [ 548.121560] protocol 88fb is buggy, dev hsr_slave_1 07:51:16 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) [ 548.152056] 9pnet: Insufficient options for proto=fd 07:51:16 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfIno', 0x3d, r0}}) 07:51:16 executing program 5: 07:51:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) stat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000600)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000640)={{{@in=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000740)=0xe8) stat(&(0x7f0000000780)='./file0/file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000840)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f0000000940)=0xe8) syz_mount_image$ext4(&(0x7f0000000200)='ext2\x00', &(0x7f00000002c0)='./file1\x00', 0x7, 0x1, &(0x7f0000000400)=[{&(0x7f0000000300)="408ccbbdb718c0803a0e28a028532339065daf2ec6f74f51a5dc5c95fff23b3c957772d348c3e20b882e1f69461c7b2ea32b3a9aec58cd884810e02e458b253044beaf49cdd3706bd5269f045690327350f8734a7430d76ad94984010a9d03323019a4962cc336366511f11bb6bd352f794ef2095b819bc230dbc25d60f5c9270aa43a939a2ad5332d001a1f58d5589f448a79864b83e4c6485e71bd1ebec9e08da8c0c8fac3922974eb92586f7f5567d65a81b5e6b6ddd642156a57f6252b264467", 0xc2, 0x9}], 0x1, &(0x7f0000000980)={[], [{@uid_lt={'uid<', r2}}, {@subj_user={'subj_user', 0x3d, 'bpf\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@uid_eq={'uid', 0x3d, r4}}, {@fowner_gt={'fowner>', r5}}, {@dont_hash='dont_hash'}, {@seclabel='seclabel'}, {@euid_gt={'euid>', r6}}, {@mask={'mask', 0x3d, 'MAY_READ'}}]}) 07:51:16 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 548.276336] protocol 88fb is buggy, dev hsr_slave_0 [ 548.281434] protocol 88fb is buggy, dev hsr_slave_1 [ 548.380683] 9pnet: Insufficient options for proto=fd [ 548.407893] 9pnet: Insufficient options for proto=fd 07:51:17 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfQno', 0x3d, r0}}) 07:51:17 executing program 5: 07:51:17 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 548.474679] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 07:51:17 executing program 5: [ 548.603765] EXT4-fs (loop0): VFS: Can't find ext4 filesystem [ 548.617809] 9pnet: Insufficient options for proto=fd 07:51:17 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c, 0x0}], 0x1, 0x0) [ 548.659817] 9pnet: Insufficient options for proto=fd 07:51:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getxattr(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=@random={'os2.', 'ramfs\x00'}, &(0x7f0000000640)=""/233, 0xe9) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@mcast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, &(0x7f0000000580)=0xe8) setuid(r1) r2 = syz_open_dev$vbi(&(0x7f0000000200)='/dev/vbi#\x00', 0x2, 0x2) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f00000002c0)={0x1, 0x0, 0x0, 0x5}) ioctl$DRM_IOCTL_AGP_FREE(r2, 0x40206435, &(0x7f0000000300)={0xc22c00000000000, r4, 0x2, 0xfffffffffffffffa}) ioctl$IMGETDEVINFO(r2, 0x80044944, &(0x7f0000000340)={0x7}) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000740)=ANY=[@ANYBLOB="09cbbbb3b028c2b40f978c1cf926861818d56f93f744915c90cbe6b04f5be06b44fee1964f0376cb6857669d70bae9aefea5090e904d1a38927f8860fe8f8f51509cd00c189789ed5a980a5455e2da17d107f4438cc0"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r5 = getpid() getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f00000003c0), &(0x7f0000000440)=0x4) r6 = syz_open_procfs(r5, &(0x7f0000000400)='net/anycast6\x00') preadv(r6, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:17 executing program 5: 07:51:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfRno', 0x3d, r0}}) 07:51:17 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:17 executing program 5: [ 548.863937] 9pnet: Insufficient options for proto=fd [ 548.912487] 9pnet: Insufficient options for proto=fd 07:51:17 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:17 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:17 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x2) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="1c13277713a9e61f7499b2fa9cc12bc3ba5a28e3c09439b44d255d09a08d63a0958f6e4ff0ff00000000000000f8fa2e1fd1083eac2aed17acde0e"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:17 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:17 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfSno', 0x3d, r0}}) 07:51:17 executing program 5: 07:51:17 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:17 executing program 5: [ 549.350304] 9pnet: Insufficient options for proto=fd [ 549.390477] 9pnet: Insufficient options for proto=fd 07:51:18 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="700000000000002000000062fa0c815147aff47b7e1c7ce6f713d1c67f45da9dae4668070c7261fce19acdbc2671ce86a6c6e8c20cdc759f47823803cdc734cad2107d2a7f8b79316bb095acc749cbf3a7a03d06ff584bbf333cf32b2b8471cbe6823a3f3af86f5cd2e5887d") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0x7fff, 0x0) ioctl$TCXONC(r1, 0x540a, 0x9) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) prctl$PR_GET_NO_NEW_PRIVS(0x27) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:18 executing program 5: 07:51:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfTno', 0x3d, r0}}) 07:51:18 executing program 5: [ 549.638335] 9pnet: Insufficient options for proto=fd [ 549.679234] 9pnet: Insufficient options for proto=fd 07:51:18 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) bind$alg(0xffffffffffffffff, 0x0, 0x0) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:18 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:18 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:18 executing program 5: 07:51:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000002c0)={&(0x7f0000000200)='./file0/file0\x00', 0x0, 0x18}, 0x10) 07:51:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfVno', 0x3d, r0}}) [ 550.192183] 9pnet: Insufficient options for proto=fd 07:51:18 executing program 5: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x802c2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='bpf\x00', 0x0, &(0x7f0000000340)={[], [{@context={'context', 0x3d, 'system_u'}}]}) 07:51:18 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c, 0x0}], 0x1, 0x0) [ 550.229515] 9pnet: Insufficient options for proto=fd 07:51:18 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfbno', 0x3d, r0}}) 07:51:19 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x1b0}}, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x14, r2, 0x3efddbe543bb3af}, 0x14}}, 0x0) 07:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x8, 0x20000) getpeername$unix(r1, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000380)=@nbd={'/dev/nbd', 0x0}, &(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)='aufs\x00', 0x800000, &(0x7f0000000440)='bdev\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 550.391960] 9pnet: Insufficient options for proto=fd [ 550.423297] 9pnet: Insufficient options for proto=fd 07:51:19 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:19 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfgno', 0x3d, r0}}) 07:51:19 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet(0x2, 0x803, 0x5) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000319ff0), 0x10) 07:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') arch_prctl$ARCH_GET_GS(0x1004, &(0x7f00000002c0)) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 551.059089] 9pnet: Insufficient options for proto=fd 07:51:19 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x18) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x1, 0x4000, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 551.087979] 9pnet: Insufficient options for proto=fd 07:51:19 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:19 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfqno', 0x3d, r0}}) 07:51:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x0, 0x0) faccessat(r1, &(0x7f00000002c0)='./file0/file0\x00', 0x1, 0x1600) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) syz_mount_image$erofs(&(0x7f00000003c0)='erofs\x00', &(0x7f0000000400)='./file1\x00', 0x8, 0x5, &(0x7f0000000700)=[{&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000002480)="164ebedf7d81a04a31f9e1742f0f75d120789e5d75dfd84e318fda486ea702b6daba8705f620cc9e8504ec6c0ad877a4a7fd0bd3aedcd6f400a5a26827af78bdee684d15d3649e8944b13bb05b42e5f614d873d63d07caedcabf9db6fdea509d85a37af833edbbe62719f69201c3b316cc97468d06ec64c0eea06c16696e4052c5420dd940f7c5a5d252adb686c9afab96cabc208e5b7e0b4383c6a0043179d86438362672f0072eea321162075e7b4a9dd1e1172516b3f5e1b6b34bf2e17b479ea7ec2cd48dce5b638f9f2c8ddda140c515d5ba73afd3bf723408dd6724504f6d4e4378d058108c78555f46b06fe4a520c23959233311fdb6eaf9ad7bf141cc694b9f9999567700b8224d4684d0ed4d660460c638dd3ece1aeb7aea3e45a82e79b966e4250347d6727210562bd06af8a72d8b1a50d94693249c78d600ba2d2de193a398a56ebf7658cae1daa10ae5f2b9d5449d10a0b2d7ceb9b88f3e1da8bf80bd44ebf6a3ceb1b85fb7d0dc299a8228d63a2c23cdf22887dc0aec7134ffbd6f65ca987e0c42707d33330c12789faa4aaa1da56150a84850a7ed5ec872024d53f7443d0983f1483b936a7db825bcf0ab526b993326a8b087bf99e0554c477694c5b3119f34f86297cacedc2133974b155d1076b1055d159c241b78a6ff701854eb420d62461150c1f1f78d6c149977744a4c2504a3a03155e137cc0c7561b5236f1af44f602c752783142a7f7011f6717e9dba3f3acd1d6942f404073702edfcb4411f6cb18b50f9dfb1735e0e73a0bfc5e982e677054b3849e8d12ce57f7531a49b54fb6d3ccdf99fcdc04fb401eba066940d6c9a0bceabc1d24c2d7022fb4077b4c21fb1ebe4d0b02ee89fb3efc8381e1ab9cbcef1ff4092a82678dedf753dafdc314cef6b782c734915c5e8d9a6bb7a387975550042161f9b5abc8a358d1397c0f009ffdaecf98c5749a0ad681625c7cd8144d470bc07d94a676808c34294264a9e87ee0dd0ca7e519aa30962140dda53b9fd04f4e70304e0384a61865c8d2237516e76aa2f684adba14255aa06e2110cd068e05255d38791fbbfe6ecfeb0ab70bf150bd18b6467443e2a87bfff860586400a02560d2bdace060cfbb7af9d5daa72480d9531ac096f82e1a877c702d16fb5ce4070fd8401bc1998af5de0ee033db9daf6047ea198909941118b9f376afdbe880c6af3b8f34d49b191816a363f002d63e49ac3f1f908561d1abe89ffa03eec9f5d8005d04b9b6c2e47e268819e0340bc12a5637251e9d4f7e2d787a2c9ca2c0a93839014a4494ad0f216ba3a5e13dee734cc590df8fa3d65a17def625735d091bcd7a8a6b21b9566496de8d469b3c3251385281cbfaa2691038bec18ce526e6b791694acd46ac3cfa3c6d17ad772d2c64075711a3610f3b0e90cd007abc898a116bffbd656a8a31444a3fefe274f15545a288ee93e054a217bd798511b45a3e6bebb594afd479a8a71fe54c4391626740364edd8fab7ef3aa347cd0caed35b77a5233255c882158252c1ccb345dfd1fbe09032ef7b8f292e3226d12b3b28425c7b285a60d8649d0ea2c6ae0e525f4d1fb4819176cc1ecdb9c287f2e8d4fa3f6830010406e5fd0f8e1f08ba3e41c0ab9e2aae79e581bff97aa1e7a12d6b20e9b8c25edead5b2315b97658082b3d1ec59947607d30e26599fed1deb621ce6c7f78f203771adf4527ad879dbd66171a55817ca1a859d49aba495511a607ee237e921612c6bbc4e522057178c99bf4ff9f5dd7f24308f6ea2faba84a824cb250e727c7828c91b691cd7de6771f68c79cd2987b03b8872e9f49517d5bc8c6cba994e9c516306734a66d52e5bd6bbf9cbacc92f48e85d79c98eaa3ed860b2e17f3132b68ea67f2b8330251c100d4ef44ff42d222d58b7c3069c46b2d58a4ddc01647b24d3664ba81774e0f1b30d67d9bfb3d4d2e068dc1a4178e24cea14db395926a4f76c2ad6c45d32ac8717224509346424dfd62ae0e7568dfb805e70a8cadf68eeb0e28337aa19a57a9d882d6a56b24fbe0bc40ff773ef464264515907329fca6d1043a19717e2b162a7f3b14f622fccf6413b6f471223662426b119c5ea503b9b3018271f4f440c8022cbe93440b2fdf91387a8517a498dc04dcf81a9265210932e16807e85140ba22c26384e06091381cf32190848bf3f66ffbd5d9769e972d8e6f24a96aa3c40692bf652f32798fcea76fee33ef115a3771ded1d63a120a2546a9883b5a425f688d6abf00e2a1e9ba53a0da059d02abe4eb5d920780b7dca058921eace125d47e090e2b57cc2dd66ba2dadb1fa2bfcb98cae7b482f2c23fe1fc0987508b083ea10022226687cabc066db3649aa823350dcd0f3e7fd324eebee87030b776918bea3179d19b506c7ff16f7c4118ae0acbc889cfaaad12cdad81760917a1d7dbdb0207edf424e3d3761c5b5396b1e58f4be5d8b17224e9f06164006518bcd96e32c5824a264fde1e50a1e4617a68f2b3eebb6aeacdecff65f5e7a2ef1728e03bba52525de52458b02bbb51935f98ea4dea3f8b017885524cdf0a2b1f6a3c70c9b3a17e0cb83cf091f319aa30177d7d055e0e5ca4656d1e55f821e5ba35a9f7d43360a8e9a76dcb39b168fd38ed903145720a11d7ec0cb333881182d62c6bbb2ed029ca637cface1c89741c5c4aa5da816f26fb65d7f22275c1c030b90b4354482d1e7d8752731eac8ed1d58b8f5fec23f2e28f872e507e7bdde76f581b5653db2586cecde42dc3d266c1e1bdfbade8e056f6178a1eaf5b67b3313fa5e0fb992658dbe4baa627490d0bfbaf7d96d846ee6a00d1a93ba8b9753dc6921d0002f6b9b913574ad6c2b72f32ae6262142732414eeacb6955b3fcd4ad3bb00d94f50a8d0b9794ecc173572361d6a4e2ee8e67d5a0e09868ed584d5557fcbf8bacd017166315bfc7156ea74f1c441de113dc5fa72cf60d8fa917e1f44aa61b2da10b72bece613a1b37aa794d35895a603f4c4e90b1383ca0043ad2ec43e44a653fd5e272ff95cc745bcd6c446ba504a367b1f7af253f24a03df399664918e44006b5489f8801e561940a6cb244692f1eecfb55ae809efc4f5d8d8629d2d47b5ec6eaa14b8c804c4f8711f267363187495db959ffbf11e360d564e5a073bf53ff6addd2bd5e5f0543e1eadd31d2560c1ac583bb65be22c2983c99e988ef080437cd22e085906a23f30fc272757cab79f6b8a8262bc7872395caaae6a6ee1a1e921a8bb8bd2c80639c05a61f7bc61cb8f12543ffd55695673e9ad34005a5d7e0bb84c56942d7a7ce8c8cd02cc471b24f553d925f62fb3cc731ebfe5f08b31caa369eed4b916cae4033df873631962f08969594bf607a384b0807360f6e35d7787189208808e3049521c45cebfea89477a9fe2922cdb18b9645f9ae1a4c4e96c46fdfd77bab50a34bdddd2e848c7ff448fcbe83bba7ade4a54aceb35f64d42a2364c8e3d0890e2888a4bc28c63791d00d68eff82f13569d57395b3b447b78b808b4b519e829298a74605ba3816f158f1b9ea4455e42e35ac4dc3504609ef1020f175e19cce8833caa150b5b45785ac5939396ba46d36720f251448d3e505cec03954c0b844bb2955408c38d7c4c67cfd81a40026c0eb4440a824c600dd3ad05c199edbf6958b03a4f0e66e3e14c0055547793cab4d343a95109344646698a04cf5058344b197652879ef3a32e91b7157fbe5dd12f997b371896e7db5ce36d473c9c8b9f22caf70e250c7b5e5a7045d9ba67fff0f528e87b6c837a12b142fa68202379163f86e37053abb4a1fd36906c78d84b3f7fa7a15d33f4f5be22cf339b21ea0830428908e7ffddf5480195ed2e8a63b1167481c14bc98dde8f150a1bdb364d3dd26a2fa92312b206c77fb0207d5c6f65acc80d684e2bb153f40acb87f9d02153ede4e643c9bb59e6a1b6a4082121fb12b3c74c877f8b08a29185184dd523597d3805d253b46f796236f57482e436614ea50a435d96f62a6ca92df00bbbce42f713c0cb6db987ec6c2a92e029b920861da824287b72d28ca7506bd154058d2299744f453e669c61cca6bcc31404fa88f87e6012a099e85148da491dacd6a8994a158e5b19dfd41d3c065722ff263962e08b74785f5f4cc0e0bc64004825943f2d6933cdd0b707f953a6d623f44abd5eb6d9783bc2aaa23faa13aab0533aa216c596d0eb56e191127b2bf0b9fe3b31b67fc790bcc254ef071304b7366d66a01384391e5785576c8ee9c98dbd9f9385357760a01cba3f690c612114ce47e5ec3c47e05719b1b42b08dfd8818abfd0f68fa50f9491cbe914890d46068ace2b85e9dfe23cd6751024483069c917e85b3d1352ad4c5c6faaeecab4a7b16e2c8a98eb7a36cf34ced2f652cdee184280275973875655a3253295bdf1ccc884e338d07fa0e991a7642588dee8edc9c696e79823dcdf48b76530b8e1ee0bf719af189947937cca12a8f5a1abdec427b1ec85f1e99cb723429f2461217e49d90528c1bf26214ae325b3af6db3a3c20864569d9c2809e13d767621c13c3f9a106127c49a169302f3ee8e494896e2d9a561c6d2f900e8f4304b236e7878eed80f5e013ad8bd55a19288cae7616a656e75fc0f28cd9f03796207d3f1dae7a09b0c8825c0b7ff4bb7e6838c0eeb1dad5e57a43bbfbd377bc687f876e4a821c702a7b525e0bbfebfe7989d79cbc609d20edcf4b9598f37ff5363fe213e9d03d74673e5f21ea87be5bddcf580825df5923457d2eb89fafd9743443782f9834a47d8b9a03c5049ad616c3c986de08c7c5fa771d1a60434e33268361827f02d2a706d05169bba41165be2b19b6cd4aa1a17e47f79fde579e8ed9ec027a99f1f0e540cb4336dbbc7e8fc5c8291fb2710cd4b112a03be4948dccf45725e97853b14030f935d6ae3bf359d59267bdd13828ee3fb5d2465224c9395f3149388769b90702cf752386f6b44157650492bf88cb47f46fa0f843b9cb948ca1af2e717a74127ca6fbd21a467fb08374732bedaeb2d8d77be00d2e31e6dd8c3f2a82d2f4d9631570eabdfded683ce4bb2deda07f6244cb8bca5f156973ac650a45af168d2da0e8944495b596c13711dabe9558ecc87cd6403137978531fdb85d99734e98ebe16a6039eb7d8c541deef5cf5ebae026322c962787032dfeebcf5fe0881816a99c2653240fc2bed13c56f3eab294b395e933a84ee71d9ce94c3a83f21465a9f5fc1c953ac0396d0f31ebcd28ff99ff2edfc6c4e355ac62f4f3e5100a8c491e5029a14960d3c8ec8e8c660edd7841f642301ccd52a4502069c14e5108cac95f47199da140c3cff69df105f06bd892922795597dee4d7295807fb39b9f06e8c190bfe584b23d04462be032befcda155cb4b04302fc55abecc70dc45adbd5480172ac89dd8e6c46dfab16fccb181f275c52f70d6b9d57dd8debe78fe97d64c5280e5fc5c16bee0ca13ecdb58d96f4252d338488385537129f9708dd3257edb2f756c22d9ec29d330779ed7c20966a51f073b1d6d4b3e5e7510410865e8d2d994cfc966ca7e87592c309fd6549377d4488b3ca79f5aec998c63ed67296d60eac64f10a4071f770d1a55b4519f9dbfa3a44f3193199b3e35fd94683663f454887de939c5b50d8a85a37390bc7bea6d89510d44a90be53c117071fa50fd7914c8b24ad49107e371e58618627ec5817d6057b00b56195312f2b6e7567ed087af5da83876850aca4b9f9f1254637ecbb5177f5a651d285c096c19213103758a8653dd69ce5b988d99a81af36aca03c18bd1d60efa2625", 0x1000, 0x9c}, {&(0x7f0000000500)="39f78d06355c6728f144e91df335c848c2ced907ff2bf76b9bf97d835cb6f54bc187e994fb02b741a7f7d92401a7d406e459c65d03e4e1d9bf0df29d5062c96b3695f2b638922b192a1c35f9de8cba43c2dad0b91c82236f6fdef066f7ef7b", 0x5f, 0xcc}, {&(0x7f0000000580)="b54506a0d40b1313c2eeb64d1c75a81a98ef603a313a2b36d1a9316365d897b85317fb3f72579358e0028be10c02272e7ebd65923086ba846ceff3ead0aadc4be268ff84376a8fa9a2600110dd0e15f6554ab31bdc0abde7c7d8ffb672d5a9c557a8c2a90613515f804f4f9535e3d43f2512cfef51a664268f46fd81f479b43598983401e892f04d0fa6b7016b9b31c2d29bafb6084fdb8f6e21c548a8d43a32ff3d71f010eeac42e86319075bcc3a4bff1b9cf1182deeb9b64fe8e50558771a3be05b3b8687a6c3ed165235982b317c9c65c44a014755925a6470f025a1bdc79e2c07a40c1c134b", 0xe8, 0x8}, {&(0x7f0000000680)="019603fbf371dd249090155ab6b57899e15039f2dd424fc8eaf1d7b4df6a1c4b3f5ade3e762da83092eef1642370f662d2eec966ff11f34392dcf1b06c80d323d616c9273c47d83f653274", 0x4b}], 0x21000, &(0x7f0000000780)={[{@acl='acl'}, {@noacl='noacl'}, {@user_xattr='user_xattr'}, {@acl='acl'}, {@acl='acl'}, {@fault_injection={'fault_injection'}}, {@user_xattr='user_xattr'}, {@fault_injection={'fault_injection', 0x3d, 0x1}}, {@acl='acl'}], [{@hash='hash'}, {@smackfsdef={'smackfsdef', 0x3d, '/proc/capi/capi20ncci\x00'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '%]'}}]}) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) accept$unix(r1, &(0x7f0000000300)=@abs, &(0x7f0000000380)=0x6e) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000880)=@sr0='/dev/sr0\x00', &(0x7f00000008c0)='./file0/file0\x00', 0x0, 0x10204a0, 0x0) connect$pptp(r1, &(0x7f0000000440)={0x18, 0x2, {0x1, @loopback}}, 0x1e) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 551.245780] 9pnet: Insufficient options for proto=fd 07:51:19 executing program 5: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x13}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 07:51:19 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) [ 551.309104] 9pnet: Insufficient options for proto=fd 07:51:20 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfsno', 0x3d, r0}}) 07:51:20 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:20 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 551.502051] 9pnet: Insufficient options for proto=fd [ 551.511597] 9pnet: Insufficient options for proto=fd 07:51:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfuno', 0x3d, r0}}) 07:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x400000, 0x0) write$FUSE_OPEN(r1, &(0x7f00000002c0)={0x20, 0x0, 0x3, {0x0, 0x3}}, 0x20) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x2, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6958ecb2907e8d373d457f20ef"]) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') prctl$PR_SET_ENDIAN(0x14, 0x1) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:20 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 551.707499] 9pnet: Insufficient options for proto=fd [ 551.758432] 9pnet: Insufficient options for proto=fd 07:51:20 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfwno', 0x3d, r0}}) 07:51:20 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 551.895948] 9pnet: Insufficient options for proto=fd 07:51:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000340)=ANY=[@ANYBLOB="dfe066b661db5e7928cea7e8ffacec4ef24bc205c9021c0240032deed76b46f08e7710e5f4e4349d12ffd613f57d58ba0eeb0ea0f9ff749ade4ab6cc875e43c3fef694af8373c1e7a873e0458c82196e1d2a5cb6e56551fcc0a3cb25eb074c4159478e4299e28fae6616d2ce9aa869d4ed5b74911df2b49930ef7c44a647877ff5e75f2bdcc040f6abef27d27362a4bc98ba8e7f97b9bd87ebceb69ec7b7634d19bb56ea1e2f4921d3cecc00000000000000000000000000"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) getsockname(r0, &(0x7f00000002c0)=@ethernet={0x0, @local}, &(0x7f0000000200)=0x80) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 551.931833] 9pnet: Insufficient options for proto=fd [ 552.196336] net_ratelimit: 18 callbacks suppressed [ 552.196344] protocol 88fb is buggy, dev hsr_slave_0 [ 552.206390] protocol 88fb is buggy, dev hsr_slave_1 [ 552.276792] protocol 88fb is buggy, dev hsr_slave_0 [ 552.281858] protocol 88fb is buggy, dev hsr_slave_1 [ 552.436411] protocol 88fb is buggy, dev hsr_slave_0 [ 552.441470] protocol 88fb is buggy, dev hsr_slave_1 [ 552.836335] protocol 88fb is buggy, dev hsr_slave_0 [ 552.841428] protocol 88fb is buggy, dev hsr_slave_1 [ 553.236388] protocol 88fb is buggy, dev hsr_slave_0 [ 553.241513] protocol 88fb is buggy, dev hsr_slave_1 07:51:22 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:22 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:22 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x2}}) 07:51:22 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:22 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x400000) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000002c0)=0x80, 0x4) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000300)={0x80, 0x3de, 0xfffffffffffffff9, 0x7fff, 0x7, 0xb26, 0x5, 0xe263, 0x8190, 0xfffffffffffffe00}) mount(&(0x7f0000000340)=@loop={'/dev/loop', 0x0}, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='affs\x00', 0x40020, &(0x7f0000000400)='securityproc\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$DRM_IOCTL_DROP_MASTER(r2, 0x641f) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:23 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="b85a8c2633dc87c3d9f45c7ac8281b0d32a1190b30c53bfe97aab03ad75d94f0d031b026347aa371d22217152887b3c8356c438cc3e10dc5703f055820c7cf162f83d432124095e36629f5e47982bd64c269861e19394c278a6d683f0fe19f26a8aa5723"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:23 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) unlink(&(0x7f0000000200)='./file0\x00') 07:51:23 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:23 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:23 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:23 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x4}}) 07:51:23 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:23 executing program 0: mmap(&(0x7f0000000000/0xfd4000)=nil, 0xfd4000, 0x0, 0x40000000000031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfc1000)=nil, 0xfc1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000fc1000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000a20000)={0x8, 0x0, &(0x7f0000fc1ffc)=[@acquire={0x40406300}], 0x0, 0x0, 0x0}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) syz_extract_tcp_res$synack(&(0x7f00000002c0), 0x1, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000200)=ANY=[@ANYBLOB="0a0f1ffa5273f64eec"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:23 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:23 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:23 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 555.316226] binder: 26480:26485 ioctl c0306201 20a20000 returned -14 07:51:24 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0xf9) fcntl$getown(r0, 0x9) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000400)=0x0) r3 = syz_open_procfs(r2, &(0x7f0000000440)='projid_map\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x320}], 0x4, 0x0) 07:51:24 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:24 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000400)={0x0}, &(0x7f0000000440)=0xc) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000480)={r1, @dev={0xac, 0x14, 0x14, 0x11}, @dev={0xac, 0x14, 0x14, 0xf}}, 0xc) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) socketpair(0x17, 0xa, 0x2, &(0x7f0000000200)) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:24 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:24 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x9}}) 07:51:24 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:24 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:24 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000200)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:24 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:24 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x59f201, 0x20) ioctl$KVM_INTERRUPT(r0, 0x4004ae86, &(0x7f00000002c0)=0x1f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:25 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:25 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:25 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000200)=0x1, 0x1) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:25 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x10}}) 07:51:25 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:25 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:25 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) readlink(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)=""/149, 0x95) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:25 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:25 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:26 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 557.406865] net_ratelimit: 22 callbacks suppressed [ 557.406873] protocol 88fb is buggy, dev hsr_slave_0 [ 557.417131] protocol 88fb is buggy, dev hsr_slave_1 07:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f00000002c0)=ANY=[@ANYBLOB="b15d0c16f374d20bace9ed003b7f6bdec9c2026180bf42f9c921452a1acbe76eacdde75935cdd8fb184aaac3b31e596669f73c66ab3a7b0e3d25f4e8cfbaa80fcea6ddd2"], &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:26 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:26 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c, 0x0}], 0x1, 0x0) [ 557.956386] protocol 88fb is buggy, dev hsr_slave_0 [ 557.961511] protocol 88fb is buggy, dev hsr_slave_1 07:51:26 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x38}}) 07:51:26 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:26 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') write$FUSE_GETXATTR(r1, &(0x7f0000000200)={0x18, 0x0, 0x6, {0x9}}, 0x18) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f00000002c0)=0x1) 07:51:26 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:26 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) r1 = accept(r0, &(0x7f0000000340)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}, &(0x7f0000000200)=0x80) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f00000003c0)={0x0, @in6={{0xa, 0x4e22, 0x300, @rand_addr="ba2b4d5540655fe41c9c38ec16adc7e3", 0x80000000}}, 0x10001, 0x1, 0x4, 0x0, 0x20}, 0xfffffffffffffffe) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000480)={r2, @in={{0x2, 0x4e20, @loopback}}, [0xa79e, 0x6cda, 0xffff, 0x4, 0x3f0, 0x100, 0x7f, 0x4, 0x2dd, 0x1f, 0xa7, 0x1, 0x1, 0x6, 0x7]}, &(0x7f00000002c0)=0x100) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:26 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:26 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:26 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 558.436370] protocol 88fb is buggy, dev hsr_slave_0 [ 558.441474] protocol 88fb is buggy, dev hsr_slave_1 07:51:27 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x10000, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x21, &(0x7f0000000380)=""/249, &(0x7f0000000480)=0xf9) fchmodat(r1, &(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f00000002c0)) preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) [ 558.516362] protocol 88fb is buggy, dev hsr_slave_0 [ 558.521518] protocol 88fb is buggy, dev hsr_slave_1 [ 558.676349] protocol 88fb is buggy, dev hsr_slave_0 [ 558.681453] protocol 88fb is buggy, dev hsr_slave_1 07:51:27 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x900}}) 07:51:27 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:27 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) preadv(r0, &(0x7f00000006c0)=[{&(0x7f0000000200)=""/46, 0x2e}, {&(0x7f00000002c0)=""/220, 0xdc}, {&(0x7f00000003c0)=""/147, 0x93}, {&(0x7f0000000480)=""/140, 0x8c}, {&(0x7f0000000540)=""/201, 0xc9}, {&(0x7f0000000640)=""/74, 0x4a}], 0x6, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000780)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000007c0)=r2) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:27 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:27 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:27 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:27 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)='bpf\x00', 0x800000, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) socketpair(0x10, 0x3, 0x400, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind$nfc_llcp(r1, &(0x7f00000002c0)={0x27, 0x0, 0x0, 0x7, 0x10001, 0x4, "97163328d552dda9676e03911a34a0449cc24f6987402083677f0b77efaf6f8b15620ffd6143897ca7430528fb19ae5eed1cd3f8ce0897e425763bd93ef504", 0x3b}, 0x60) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:27 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:27 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:27 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:28 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:28 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x1020}}) 07:51:28 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000b80)='./file0/file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000bc0)=ANY=[@ANYBLOB="ac069a4b6bbb6694e7ad3f37654111d7a098ea8da1220e7ed146457df5e73257a68c090d0e468b232dc044790db76c09640f21583617b4af28"], &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) recvmsg(r0, &(0x7f0000000700)={&(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000340)=""/198, 0xc6}, {&(0x7f0000000440)=""/244, 0xf4}, {&(0x7f0000000540)=""/185, 0xb9}, {&(0x7f0000000200)=""/15, 0xf}, {&(0x7f0000000600)=""/113, 0x71}], 0x5, &(0x7f0000001480)=""/4096, 0x1000}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000780)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r1, &(0x7f0000000b00)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x410000}, 0xc, &(0x7f0000000ac0)={&(0x7f00000007c0)={0x2f4, r2, 0x810, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x60, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x30000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2b6840b1}]}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xb3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x18}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x58e1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_NODE={0x4}, @TIPC_NLA_MEDIA={0x114, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9e23}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2f9e}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3c7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3d}]}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xff}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xc712}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}]}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'bridge_slave_1\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffffffffffffffff}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}]}, 0x2f4}, 0x1, 0x0, 0x0, 0x24000084}, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r1, 0x227b, &(0x7f0000000b40)=0x1) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r3, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) syz_open_dev$audion(&(0x7f0000000c00)='/dev/audio#\x00', 0x5, 0x0) 07:51:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:28 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:28 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:28 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:28 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:28 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:28 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:28 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:29 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x2000}}) 07:51:29 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:29 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:29 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:29 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) lsetxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000300)='TRUE', 0x4, 0x3) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)) preadv(r1, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:29 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:29 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f023c123f3188a070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000903000)='./file0\x00', 0x0, 0x4, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x23080, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='bpf\x00', 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='mode=0']) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000240)='/dev/vbi#\x00', 0x0, 0x2) write$P9_RREADDIR(r1, &(0x7f00000002c0)={0xa6, 0x29, 0x1, {0xffffffff, [{{0x81, 0x2, 0x6}, 0x7ff, 0x3, 0x7, './file0'}, {{0xb4, 0x0, 0x1}, 0x257, 0xf9, 0x7, './file0'}, {{0xc0, 0x2, 0x8}, 0x8, 0x4, 0x7, './file1'}, {{0x11, 0x2, 0x4}, 0xffffffffffff7fff, 0x499, 0x7, './file0'}, {{0x10}, 0x2, 0x1f, 0x7, './file0'}]}}, 0xa6) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r2, &(0x7f0000000100)=[{&(0x7f0000000040)=""/42, 0x2a}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000001280)=""/242, 0xffffff7a}, {&(0x7f0000001380)=""/239, 0x47}], 0x4, 0x0) 07:51:29 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:29 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:29 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:29 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:30 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x2010}}) 07:51:30 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:30 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:30 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:30 executing program 4: r0 = userfaultfd(0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:30 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:30 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:30 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:30 executing program 4: r0 = userfaultfd(0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:30 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:30 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:30 executing program 4: r0 = userfaultfd(0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x3800}}) [ 562.596323] net_ratelimit: 18 callbacks suppressed [ 562.596332] protocol 88fb is buggy, dev hsr_slave_0 [ 562.606441] protocol 88fb is buggy, dev hsr_slave_1 [ 562.676370] protocol 88fb is buggy, dev hsr_slave_0 [ 562.681508] protocol 88fb is buggy, dev hsr_slave_1 [ 562.836334] protocol 88fb is buggy, dev hsr_slave_0 [ 562.841479] protocol 88fb is buggy, dev hsr_slave_1 07:51:31 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:31 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 4: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:31 executing program 4: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 563.236318] protocol 88fb is buggy, dev hsr_slave_0 [ 563.241436] protocol 88fb is buggy, dev hsr_slave_1 07:51:31 executing program 4: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:31 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:32 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x3f00}}) [ 563.636425] protocol 88fb is buggy, dev hsr_slave_0 [ 563.641577] protocol 88fb is buggy, dev hsr_slave_1 07:51:32 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:32 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:32 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:32 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:32 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:32 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:32 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:32 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:32 executing program 3: r0 = userfaultfd(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:32 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:32 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x4000}}) 07:51:33 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) close(r3) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(r1, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 3: r0 = userfaultfd(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:33 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:33 executing program 3: r0 = userfaultfd(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:33 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 3: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:33 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xedc0}}) 07:51:34 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:34 executing program 3: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:34 executing program 3: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:34 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:34 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x40000}}) 07:51:34 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:34 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:34 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:35 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:35 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r3 = userfaultfd(0x0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:35 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:35 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:35 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x1000000}}) 07:51:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:35 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:35 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:35 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:35 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:36 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:36 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:36 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:36 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 567.796380] net_ratelimit: 22 callbacks suppressed [ 567.796389] protocol 88fb is buggy, dev hsr_slave_0 [ 567.806510] protocol 88fb is buggy, dev hsr_slave_1 07:51:36 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x2000000}}) 07:51:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:36 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:36 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:36 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) [ 568.356361] protocol 88fb is buggy, dev hsr_slave_0 [ 568.361499] protocol 88fb is buggy, dev hsr_slave_1 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:37 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:37 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:37 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c, 0x0}], 0x1, 0x0) [ 568.836340] protocol 88fb is buggy, dev hsr_slave_0 [ 568.841475] protocol 88fb is buggy, dev hsr_slave_1 07:51:37 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x9000000}}) 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:37 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) [ 568.926353] protocol 88fb is buggy, dev hsr_slave_0 [ 568.931520] protocol 88fb is buggy, dev hsr_slave_1 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c, 0x0}], 0x1, 0x0) [ 569.076408] protocol 88fb is buggy, dev hsr_slave_0 [ 569.081594] protocol 88fb is buggy, dev hsr_slave_1 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:37 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:37 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:38 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x10000000}}) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x80000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x7, 0x0, 0x8, 0x1, 0x0, r2, 0x0, [0x18]}, 0x2c) r3 = userfaultfd(0x0) close(r3) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r3, r0, 0x0) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:38 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:38 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:39 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:39 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x20000000}}) 07:51:39 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:39 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:39 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:39 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c, 0x0}], 0x1, 0x0) [ 572.608156] IPVS: ftp: loaded support on port[0] = 21 [ 572.664448] chnl_net:caif_netlink_parms(): no params data found [ 572.690548] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.697022] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.703886] device bridge_slave_0 entered promiscuous mode [ 572.711047] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.717478] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.724294] device bridge_slave_1 entered promiscuous mode [ 572.738495] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 572.747307] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 572.765342] team0: Port device team_slave_0 added [ 572.771514] team0: Port device team_slave_1 added [ 572.828749] device hsr_slave_0 entered promiscuous mode [ 572.866556] device hsr_slave_1 entered promiscuous mode [ 572.914227] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.920564] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.927194] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.933517] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.961013] 8021q: adding VLAN 0 to HW filter on device bond0 [ 572.973244] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 572.980608] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.998084] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.005234] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 573.014959] 8021q: adding VLAN 0 to HW filter on device team0 [ 573.023142] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 573.030817] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.037175] bridge0: port 1(bridge_slave_0) entered forwarding state [ 573.045804] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 573.053887] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.060244] bridge0: port 2(bridge_slave_1) entered forwarding state [ 573.078023] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 573.085643] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 573.093444] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 573.101242] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 573.110339] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 573.120863] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 573.128374] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 573.144971] 8021q: adding VLAN 0 to HW filter on device batadv0 07:51:42 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) pipe2(&(0x7f00000001c0), 0x80000) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:42 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:42 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x20100000}}) 07:51:42 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:42 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:42 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:42 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:43 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x38000000}}) 07:51:43 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:43 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:43 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:44 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:44 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x3f000000}}) 07:51:44 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:44 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:44 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:44 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:44 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:44 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:45 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x40000000}}) 07:51:45 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:45 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:45 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:45 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:45 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:45 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:46 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x8cffffff}}) 07:51:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:46 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:46 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:46 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:46 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:46 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:46 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:46 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:47 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xc0ed0000}}) 07:51:47 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:47 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:47 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:47 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:47 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:47 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:47 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:47 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:47 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:47 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:47 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xf6ffffff}}) 07:51:48 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:48 executing program 5: r0 = userfaultfd(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:48 executing program 5: r0 = userfaultfd(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:48 executing program 5: r0 = userfaultfd(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(0xffffffffffffffff, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xffff0000}}) 07:51:48 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:48 executing program 5: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:48 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:49 executing program 5: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:49 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:49 executing program 5: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xffffff7f}}) 07:51:49 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:49 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:49 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:50 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:50 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:50 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:50 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:50 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:50 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:50 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xffffff8c}}) 07:51:50 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:50 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:50 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:50 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:50 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:50 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:51 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:51 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xfffffff6}}) 07:51:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:51 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x200000000024000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x7fff, 0x1, @perf_config_ext={0x9, 0x9}, 0x84, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:51 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:51 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:52 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:52 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:52 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:52 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xedc000000000}}) 07:51:52 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:52 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:52 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80fe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:52 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0fe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:53 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:53 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:53 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x4000000000000}}) 07:51:53 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:53 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:53 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) syz_genetlink_get_family_id$team(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:53 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:54 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:54 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:54 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x100000000000000}}) 07:51:54 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:54 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:54 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400300]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:54 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)=0xffffffffffffffff, 0xffbf) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:54 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:55 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:55 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x200000000000000}}) 07:51:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:55 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r2 = userfaultfd(0x0) close(r2) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r2, r0, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:55 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:55 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:55 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, &(0x7f0000000140)=@isdn, &(0x7f00000002c0)=0x80) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:55 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:56 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:56 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:56 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x900000000000000}}) 07:51:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:56 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:56 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:56 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:56 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8030000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:56 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:56 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4010000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:56 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:57 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x1000000000000000}}) 07:51:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:57 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:57 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:57 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:57 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe800000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:57 executing program 0: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:57 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:57 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec00000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:57 executing program 0: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:58 executing program 0: ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r0 = userfaultfd(0x0) close(r0) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000400)=""/100, 0x64) dup3(r0, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x2000000000000000}}) 07:51:58 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdef]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:58 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:58 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8d]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:58 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:58 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x2010000000000000}}) 07:51:59 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:59 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40030000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:59 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, 0x0, 0x0) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:59 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:59 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x3800000000000000}}) 07:51:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:51:59 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, 0x0) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:51:59 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x3f00000000000000}}) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8dffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x0, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:00 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe803000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xeffdffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:00 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf401000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:01 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:01 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe80000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:01 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x4000000000000000}}) 07:52:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfec0000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:01 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:01 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x0, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff00000000000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:01 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:02 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(0xffffffffffffffff, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}, 0x1c, 0x0}], 0x1, 0x0) [ 593.472271] cgroup: fork rejected by pids controller in /syz3 07:52:02 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0x8cffffff00000000}}) 07:52:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:02 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:02 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x0, 0xc, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:02 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:02 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}}, 0x1c, 0x0}], 0x1, 0x0) [ 595.952694] IPVS: ftp: loaded support on port[0] = 21 [ 596.128454] chnl_net:caif_netlink_parms(): no params data found [ 596.152545] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.159002] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.165786] device bridge_slave_0 entered promiscuous mode [ 596.172379] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.178806] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.185617] device bridge_slave_1 entered promiscuous mode [ 596.200755] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 596.210300] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 596.226486] team0: Port device team_slave_0 added [ 596.232044] team0: Port device team_slave_1 added [ 596.287812] device hsr_slave_0 entered promiscuous mode [ 596.326551] device hsr_slave_1 entered promiscuous mode [ 596.426668] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.433006] bridge0: port 2(bridge_slave_1) entered forwarding state [ 596.439652] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.445973] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.518484] 8021q: adding VLAN 0 to HW filter on device bond0 [ 596.553807] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 596.561051] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.568017] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.575107] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 596.584488] 8021q: adding VLAN 0 to HW filter on device team0 [ 596.596726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 596.604194] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.610549] bridge0: port 1(bridge_slave_0) entered forwarding state [ 596.687895] device bridge_slave_1 left promiscuous mode [ 596.693319] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.757201] device bridge_slave_0 left promiscuous mode [ 596.762739] bridge0: port 1(bridge_slave_0) entered disabled state [ 600.008769] device hsr_slave_1 left promiscuous mode [ 600.060789] device hsr_slave_0 left promiscuous mode [ 600.102280] team0 (unregistering): Port device team_slave_1 removed [ 600.112095] team0 (unregistering): Port device team_slave_0 removed [ 600.123327] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 600.189558] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 600.275281] bond0 (unregistering): Released all slaves [ 600.370558] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 600.378879] bridge0: port 2(bridge_slave_1) entered blocking state [ 600.385202] bridge0: port 2(bridge_slave_1) entered forwarding state [ 600.392405] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 600.405546] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 600.415658] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 600.426166] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 600.433644] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 600.441770] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 600.449284] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 600.456877] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 600.464225] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 600.471677] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 600.480797] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 600.496174] 8021q: adding VLAN 0 to HW filter on device batadv0 07:52:09 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:09 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:09 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(0xffffffffffffffff) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:09 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:09 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0x0, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xf6ffffff00000000}}) 07:52:10 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:10 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0x0, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfc]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:10 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f4]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:10 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0x0, 0x4, 0x4000, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3e8]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:10 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x0, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [], 0xffff000000000000}}) 07:52:10 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:10 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:10 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x0, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:11 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:11 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:11 executing program 5: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:11 executing program 3: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) pipe2(0x0, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:11 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00]}}, 0x1c, 0x0}], 0x1, 0x0) 07:52:11 executing program 4: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffd000/0x3000)=nil, 0x3000}, 0x1}) r1 = userfaultfd(0x0) close(r1) clone(0x0, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0585609, &(0x7f0000000340)={0x100000000, 0xc, 0x4, 0x0, {}, {0x5, 0xc, 0x4, 0x7, 0x3, 0x8, "cd5c4389"}, 0x6, 0x7, @offset=0x9, 0x4}) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:11 executing program 0: r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0x22}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, 0x0) r1 = userfaultfd(0x0) close(r1) clone(0x88100000, &(0x7f0000000200)="255e448ea603000000f4cf599250d9ce31d1cc8de7e54e44a0256528fa0ac97f3e3df657000000000000004d0ffc0000", 0x0, 0x0, 0x0) read(r0, &(0x7f0000000400)=""/100, 0x64) dup3(r1, r0, 0x0) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000100)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x1000)=nil, 0x1000}) 07:52:11 executing program 2: r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x69) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f0000000480)=[{&(0x7f0000000040)=@in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00]}}, 0x1c, 0x0}], 0x1, 0x0) [ 603.131852] ================================================================== [ 603.139550] BUG: KASAN: use-after-free in get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.146720] Read of size 8 at addr ffff888054925750 by task syz-executor4/28914 [ 603.154141] [ 603.155751] CPU: 0 PID: 28914 Comm: syz-executor4 Not tainted 5.0.0-rc5 #60 [ 603.162823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.172266] Call Trace: [ 603.174838] dump_stack+0x172/0x1f0 [ 603.178450] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.183289] print_address_description.cold+0x7c/0x20d [ 603.188544] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.193366] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.198188] kasan_report.cold+0x1b/0x40 [ 603.202229] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.207056] __asan_report_load8_noabort+0x14/0x20 [ 603.211968] get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.216618] mem_cgroup_try_charge+0x238/0x5e0 [ 603.221181] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 603.226697] mcopy_atomic+0x893/0x2600 [ 603.230560] ? find_held_lock+0x35/0x130 [ 603.234609] ? mm_alloc_pmd+0x300/0x300 [ 603.238562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 603.244077] ? _copy_from_user+0xdd/0x150 [ 603.248205] userfaultfd_ioctl+0x4dd/0x39e0 [ 603.252508] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 603.257510] ? userfaultfd_read+0x1940/0x1940 [ 603.261982] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 603.267497] ? check_preemption_disabled+0x48/0x290 [ 603.272494] ? debug_smp_processor_id+0x1c/0x20 [ 603.277141] ? perf_trace_lock+0xeb/0x510 [ 603.281265] ? mark_held_locks+0x100/0x100 [ 603.285489] ? zap_class+0x460/0x460 [ 603.289179] ? perf_trace_lock+0xeb/0x510 [ 603.293305] ? __might_fault+0x12b/0x1e0 [ 603.297346] ? find_held_lock+0x35/0x130 [ 603.301389] ? __fget+0x340/0x540 [ 603.304820] ? userfaultfd_read+0x1940/0x1940 [ 603.309295] do_vfs_ioctl+0xd6e/0x1390 [ 603.313160] ? userfaultfd_read+0x1940/0x1940 [ 603.317637] ? do_vfs_ioctl+0xd6e/0x1390 [ 603.321680] ? ioctl_preallocate+0x210/0x210 [ 603.326070] ? __fget+0x367/0x540 [ 603.329506] ? iterate_fd+0x360/0x360 [ 603.333286] ? nsecs_to_jiffies+0x30/0x30 [ 603.337423] ? security_file_ioctl+0x93/0xc0 [ 603.341810] ksys_ioctl+0xab/0xd0 [ 603.345246] __x64_sys_ioctl+0x73/0xb0 [ 603.349128] do_syscall_64+0x103/0x610 [ 603.352996] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.358164] RIP: 0033:0x457e39 [ 603.361338] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 603.380217] RSP: 002b:00007f3efea5cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 603.387903] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 603.395154] RDX: 0000000020000100 RSI: 00000000c028aa03 RDI: 0000000000000004 [ 603.402399] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 603.409647] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3efea5d6d4 [ 603.416896] R13: 00000000004c2439 R14: 00000000004d4d18 R15: 00000000ffffffff [ 603.424153] [ 603.425759] Allocated by task 28903: [ 603.429464] save_stack+0x45/0xd0 [ 603.432897] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 603.437810] kasan_slab_alloc+0xf/0x20 [ 603.441671] kmem_cache_alloc_node+0x144/0x710 [ 603.446238] copy_process.part.0+0x1d08/0x79a0 [ 603.450803] _do_fork+0x257/0xfe0 [ 603.454234] __x64_sys_clone+0xbf/0x150 [ 603.458285] do_syscall_64+0x103/0x610 [ 603.462149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.467309] [ 603.468910] Freed by task 28903: [ 603.472263] save_stack+0x45/0xd0 [ 603.475690] __kasan_slab_free+0x102/0x150 [ 603.479902] kasan_slab_free+0xe/0x10 [ 603.483682] kmem_cache_free+0x86/0x260 [ 603.487635] free_task+0xdd/0x120 [ 603.491063] copy_process.part.0+0x1a3a/0x79a0 [ 603.495619] _do_fork+0x257/0xfe0 [ 603.499048] __x64_sys_clone+0xbf/0x150 [ 603.502999] do_syscall_64+0x103/0x610 [ 603.506864] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.512023] [ 603.513629] The buggy address belongs to the object at ffff888054924680 [ 603.513629] which belongs to the cache task_struct(65:syz4) of size 6080 [ 603.527129] The buggy address is located 4304 bytes inside of [ 603.527129] 6080-byte region [ffff888054924680, ffff888054925e40) [ 603.539149] The buggy address belongs to the page: [ 603.544054] page:ffffea0001524900 count:1 mapcount:0 mapping:ffff88808d21cc00 index:0x0 compound_mapcount: 0 [ 603.553995] flags: 0x1fffc0000010200(slab|head) [ 603.558651] raw: 01fffc0000010200 ffffea0002314c88 ffffea000246ab08 ffff88808d21cc00 [ 603.566511] raw: 0000000000000000 ffff888054924680 0000000100000001 ffff88805bc38780 [ 603.574362] page dumped because: kasan: bad access detected [ 603.580049] page->mem_cgroup:ffff88805bc38780 [ 603.584515] [ 603.586115] Memory state around the buggy address: [ 603.591018] ffff888054925600: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 603.598353] ffff888054925680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 603.605685] >ffff888054925700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 603.613014] ^ [ 603.619046] ffff888054925780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 603.626382] ffff888054925800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 603.633712] ================================================================== [ 603.641041] Disabling lock debugging due to kernel taint [ 603.670991] Kernel panic - not syncing: panic_on_warn set ... [ 603.676991] CPU: 0 PID: 28914 Comm: syz-executor4 Tainted: G B 5.0.0-rc5 #60 [ 603.677141] kobject: 'loop5' (000000004a21c971): kobject_uevent_env [ 603.685460] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 603.685465] Call Trace: [ 603.685481] dump_stack+0x172/0x1f0 [ 603.685497] panic+0x2cb/0x65c [ 603.695712] kobject: 'loop5' (000000004a21c971): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 603.701220] ? __warn_printk+0xf3/0xf3 [ 603.701242] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.701254] ? preempt_schedule+0x4b/0x60 [ 603.701268] ? ___preempt_schedule+0x16/0x18 [ 603.737299] ? trace_hardirqs_on+0x5e/0x230 [ 603.741611] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.746430] end_report+0x47/0x4f [ 603.749868] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.754698] kasan_report.cold+0xe/0x40 [ 603.758656] ? get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.763481] __asan_report_load8_noabort+0x14/0x20 [ 603.768387] get_mem_cgroup_from_mm+0x28f/0x2b0 [ 603.773030] mem_cgroup_try_charge+0x238/0x5e0 [ 603.777585] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 603.783095] mcopy_atomic+0x893/0x2600 [ 603.786956] ? find_held_lock+0x35/0x130 [ 603.791000] ? mm_alloc_pmd+0x300/0x300 [ 603.794949] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 603.800463] ? _copy_from_user+0xdd/0x150 [ 603.804593] userfaultfd_ioctl+0x4dd/0x39e0 [ 603.808906] ? drop_futex_key_refs.isra.0+0x6f/0xf0 [ 603.813913] ? userfaultfd_read+0x1940/0x1940 [ 603.818384] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 603.823898] ? check_preemption_disabled+0x48/0x290 [ 603.828896] ? debug_smp_processor_id+0x1c/0x20 [ 603.833536] ? perf_trace_lock+0xeb/0x510 [ 603.837657] ? mark_held_locks+0x100/0x100 [ 603.841867] ? zap_class+0x460/0x460 [ 603.845561] ? perf_trace_lock+0xeb/0x510 [ 603.849681] ? __might_fault+0x12b/0x1e0 [ 603.853721] ? find_held_lock+0x35/0x130 [ 603.857763] ? __fget+0x340/0x540 [ 603.861191] ? userfaultfd_read+0x1940/0x1940 [ 603.865658] do_vfs_ioctl+0xd6e/0x1390 [ 603.869517] ? userfaultfd_read+0x1940/0x1940 [ 603.873990] ? do_vfs_ioctl+0xd6e/0x1390 [ 603.878026] ? ioctl_preallocate+0x210/0x210 [ 603.882413] ? __fget+0x367/0x540 [ 603.885866] ? iterate_fd+0x360/0x360 [ 603.890197] ? nsecs_to_jiffies+0x30/0x30 [ 603.894337] ? security_file_ioctl+0x93/0xc0 [ 603.898721] ksys_ioctl+0xab/0xd0 [ 603.902152] __x64_sys_ioctl+0x73/0xb0 [ 603.906025] do_syscall_64+0x103/0x610 [ 603.909913] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 603.914010] kobject: 'loop3' (00000000b92df6b5): kobject_uevent_env [ 603.915088] RIP: 0033:0x457e39 [ 603.922645] kobject: 'loop3' (00000000b92df6b5): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 603.924732] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 603.953015] RSP: 002b:00007f3efea5cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 603.960695] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457e39 [ 603.967939] RDX: 0000000020000100 RSI: 00000000c028aa03 RDI: 0000000000000004 [ 603.975181] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 603.982424] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3efea5d6d4 [ 603.989665] R13: 00000000004c2439 R14: 00000000004d4d18 R15: 00000000ffffffff [ 603.997981] Kernel Offset: disabled [ 604.001595] Rebooting in 86400 seconds..