DRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x12, "6ae1f5f14eab47cbd65f7d4b615d105e4879"}, &(0x7f0000000280)=0x1a) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r1, 0x84, 0x7b, &(0x7f00000002c0)={r2, 0xf4}, 0x8) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') r4 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000180)=""/239, 0xfffffffffffffd58) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300)='/dev/cachefiles\x00', 0x400, 0x0) getdents64(r4, 0x0, 0x0) close(r0) 05:55:06 executing program 0: 05:55:06 executing program 1: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x6b, 0x200) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:06 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:06 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x20000284, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:06 executing program 3: 05:55:07 executing program 0: 05:55:07 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x644000, 0x21) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r1, 0x28, 0x1, &(0x7f0000000080)=0xfffffffffffffeff, 0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@broadcast}}, &(0x7f00000002c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000300)={'vcan0\x00', r4}) getsockopt$ARPT_SO_GET_INFO(r1, 0x0, 0x60, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000140)=0x44) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x400000, 0x0) ioctl$TCXONC(r0, 0x540a, 0x7) socket$packet(0x11, 0x106, 0x300) getsockopt$inet_buf(r0, 0x0, 0x2d, &(0x7f00000000c0)=""/214, &(0x7f00000001c0)=0xd6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x6, 0x3390, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x7ffffffff000, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 3: 05:55:07 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000080)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000180)=""/239, 0xef) getdents64(r2, 0x0, 0x0) close(r0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000280)={0x9b0000, 0x479c1536, 0xae0, [], &(0x7f0000000040)={0x9b0b6f, 0x6, [], @value64=0x3}}) 05:55:07 executing program 0: 05:55:07 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x80) r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000080)={0x7ff}, 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0a5c1f023c120085719070") setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000100)=0x5, 0x4) sendmmsg$inet_sctp(r0, &(0x7f0000002bc0)=[{&(0x7f0000000000)=@in={0x2, 0x0, @local}, 0x10, &(0x7f0000000500)=[{&(0x7f00000001c0)="93", 0x1}], 0x1}], 0x1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r3 = accept$inet6(0xffffffffffffff9c, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f0000000200), &(0x7f0000000240)=0x14) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r4, &(0x7f00000002c0)="42a628992f8f46e229696385ad0fb3b5cffd04074c96811861a3b53c0e3f905c03d0a5aca2eac7c0f105a2373c2381a17bad9dacbfa20d8fffa699d53ca6e2b8e868ea850dacf3707c571dec172ce8b1e5388fef13d70a96cab184e9dbce9287b817c4c396e92568606a38ecdb498a8002e47e14c56e5bcba41692e434b7e0a8cd3a109f6b3e195a5e2094ff356cd915c5c0e4e4760788b1e60de000309c0e1c7723de45e670780f003989c925ceacbeb92a2b8a060ead1f3aeac7f31b18947ed8d4228aabb422c79e2e54cb11e84514efe7c63a49c3eb34abc31237971b2d648919c72bfb56268f4cfd", &(0x7f0000000400)=""/199}, 0x18) 05:55:07 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) recvmmsg(r0, 0x0, 0x0, 0x21, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000080)="c4e6cbc6e7da4e8a3cab40b123bbe2cfe08ee816808fab7f3e7fba146d285aad33c17802baa2672796a106d46cd667afdab3dcb943e25a87d90f661a51d3d4afafcfe41afc561d7d4443ddad27d73e21a9a3a187dd00c778aa2b7bbe582506baba6e3bfd73bf8cc70be02626cb9af0c17954c62b42138cb7852af547c4f7c0749eceb875f0d0140a78badd5c883f02f9ef6e4f02044303bfa03ff8cd3e553de1ef660ce42fc588be5ccaeb6cb19961944d211c442b75c0831269bc2b9365bf7d99f9dedb3dfb3603c93896119a17d8bf4375fa7a443cd7b600d1f3152838a7b2", &(0x7f0000000180)=""/42}, 0x18) 05:55:07 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 3: 05:55:07 executing program 0: 05:55:07 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 3: 05:55:07 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'system.', '*^selinux\xccself\xd0-ppp1+\x00'}, &(0x7f00000000c0)='!:proc\x00', 0x7, 0x2) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 1: pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r0, 0x28, 0x2, &(0x7f00000001c0)=0x1, 0x8) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x60000, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@ipv4_getroute={0x1c, 0x1a, 0x4, 0x70bd2a, 0x25dfdbfe, {0x2, 0x0, 0x30, 0x1, 0xff, 0x2, 0xff, 0x7, 0x100}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc050}, 0x20000004) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 0: 05:55:07 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000280)={0x7ab2, 0x3, 0x62, 'queue0\x00', 0x3}) unlink(&(0x7f00000000c0)='./control/file0\x00') r2 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents(r2, &(0x7f0000000180)=""/239, 0xef) getdents64(r2, 0x0, 0x0) close(r0) 05:55:07 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 3: 05:55:07 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x236) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$VIDIOC_G_FMT(r1, 0xc0d05604, &(0x7f0000000080)={0x3, @sliced={0x80, [0x0, 0x4, 0xfff, 0x8001, 0x401, 0x7ff, 0x3, 0x2, 0x8, 0x80, 0x2, 0xfffffffffffffffc, 0x3, 0x10000, 0xed, 0x6, 0x4, 0x45a3, 0x6, 0xffffffffffffffff, 0x80, 0x7, 0x5, 0x10001, 0x9, 0x9, 0x0, 0x8, 0x1, 0x1, 0x46, 0x745f, 0x1, 0x1, 0x3ff, 0x401, 0xffffffff, 0x2, 0x400, 0x1, 0x5, 0xb916, 0x569, 0x8b, 0x20, 0x5, 0x4, 0xffff], 0x401}}) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 3: 05:55:07 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = msgget(0x1, 0xa0) msgctl$MSG_INFO(r1, 0xc, &(0x7f0000000040)=""/155) dup2(r0, r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, 0x30, r0, 0x0) 05:55:07 executing program 0: 05:55:07 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="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", 0xfb, 0xfffffffffffffffa) arch_prctl$ARCH_SET_GS(0x1001, 0x401) r2 = request_key(&(0x7f00000001c0)='rxrpc_s\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='eth1}\x00', 0xfffffffffffffffa) r3 = request_key(&(0x7f0000000580)='trusted\x00U#\x17\xe1V\xa5\v\xd0SI\x1e\x95', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='\x00', 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000380)={r1, r2, r3}, &(0x7f0000000400)=""/71, 0x47, &(0x7f0000000540)={&(0x7f0000000480)={'crct10dif\x00'}, &(0x7f00000004c0)="6289df12e38ef41a5132c45ab4ff1aee1fbff6776161d4e2fc2fa4b23e7e275649a9a708d60d5892a2e8858e42329c6a3d23439adbbaf232419a55b93052364021db6c87862a626acb19a69081e54b225f0c47205a0558af301f1d95eef43adf678db6112459f0f0d4", 0x69}) [ 861.094007] net_ratelimit: 20 callbacks suppressed [ 861.094016] protocol 88fb is buggy, dev hsr_slave_0 [ 861.104142] protocol 88fb is buggy, dev hsr_slave_1 05:55:07 executing program 3: 05:55:07 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xffffffffffffffc8, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:07 executing program 3: 05:55:07 executing program 2: mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x80, 0x0) ioctl$NBD_SET_FLAGS(r1, 0xab0a, 0xbb) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) fcntl$setsig(r0, 0xa, 0x9) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r1, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x50, r2, 0x0, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffffc}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x800) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = creat(&(0x7f0000000000)='./control/file0\x00', 0x0) write$sndseq(r3, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) unlink(&(0x7f00000000c0)='./control/file0\x00') r4 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) getdents(r4, &(0x7f0000000180)=""/239, 0xef) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000140)) lstat(&(0x7f0000000280)='./control/file0\x00', &(0x7f00000002c0)) getdents64(r4, 0x0, 0x0) close(r0) ioctl(r4, 0x3, &(0x7f0000000340)) 05:55:07 executing program 0: 05:55:07 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x1ff) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x26) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r3 = request_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='/dev/mixer\x00', 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, r3) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x80000000}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={r4, @in={{0x2, 0x4e23, @multicast1}}}, &(0x7f00000001c0)=0x84) 05:55:07 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 861.334015] protocol 88fb is buggy, dev hsr_slave_0 [ 861.339188] protocol 88fb is buggy, dev hsr_slave_1 05:55:08 executing program 3: 05:55:08 executing program 0: 05:55:08 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x40, 0x0) tee(r0, r1, 0x5c2b, 0x2) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 3: 05:55:08 executing program 0: [ 861.574026] protocol 88fb is buggy, dev hsr_slave_0 [ 861.579293] protocol 88fb is buggy, dev hsr_slave_1 [ 861.584531] protocol 88fb is buggy, dev hsr_slave_0 [ 861.589631] protocol 88fb is buggy, dev hsr_slave_1 [ 861.594798] protocol 88fb is buggy, dev hsr_slave_0 [ 861.599890] protocol 88fb is buggy, dev hsr_slave_1 05:55:08 executing program 2: 05:55:08 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000040), 0x0) connect$pptp(r1, &(0x7f0000000080)={0x18, 0x2, {0x2, @local}}, 0x1e) 05:55:08 executing program 0: 05:55:08 executing program 3: 05:55:08 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x40, 0x400) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000300)) accept$alg(r0, 0x0, 0x0) dup2(r0, r0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000140)={0x0, @in6={{0xa, 0x4e20, 0x2, @loopback, 0x2}}, 0x81, 0x1, 0xffc0000000000000, 0x4}, &(0x7f0000000200)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000240)={r1, 0x4}, &(0x7f00000002c0)=0x8) r2 = shmget$private(0x0, 0x3000, 0x20, &(0x7f0000ffa000/0x3000)=nil) shmctl$SHM_STAT(r2, 0xd, &(0x7f0000000040)=""/151) perf_event_open(0x0, 0x0, 0xfffffffffffffffe, r0, 0x0) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 2: 05:55:08 executing program 0: 05:55:08 executing program 3: 05:55:08 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x102, 0x0) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_GEM_OPEN(r1, 0xc010640b, &(0x7f00000000c0)={r2, 0x0, 0x52}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x6, 0x10000, 0x6, 0x81, 0x1}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000180)=r3, 0x4) 05:55:08 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 2: 05:55:08 executing program 0: 05:55:08 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x200, 0x480) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000100)={r2, 0xfffffffffffffedd, "80f719f5871dac6c606e370fb3b8f4a2d520794995f17f1ca8c6004ed2654656d29b0f72ff34b2db540f858e03964ae8dd9c415f331e714ee617a17dd2d776a44f0569ee9006bbadd7b7eb6fe01dbcaef82a3c09cabb73cac92786cd8edb87ac2d26585ab7cfff8674350241e3bbbb44da2aa5296b8785ede1a4504e5187e0214585d5f0430f56c19d593463d9472e597c25453cd4eb1f01f079c19de03ffb8af14d3d63e76b95e4e909fe18"}, &(0x7f00000001c0)=0xb4) epoll_create(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) 05:55:08 executing program 3: 05:55:08 executing program 2: 05:55:08 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400000, 0x0) write$smack_current(r1, &(0x7f0000000080)='posix_acl_accesssecurity)\x89\\ppp0em0posix_acl_access*trusted[-.(\x00', 0x3f) 05:55:08 executing program 0: 05:55:08 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='\\wlan1GPLeth1-#\\\x00', r0}, 0x10) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:08 executing program 3: 05:55:08 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x208c00, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0xfffffffffffffbff, 0x12) 05:55:08 executing program 2: 05:55:09 executing program 0: 05:55:09 executing program 3: 05:55:09 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000040)='s\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 0: 05:55:09 executing program 2: 05:55:09 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x338d, 0x3, 0x23, r0}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 3: 05:55:09 executing program 0: 05:55:09 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 2: 05:55:09 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0xa0000, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0xe, 0x6, 0x0, 0xeb, 0x9, r0, 0xd33}, 0x2c) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f00000000c0)=0xfffffffffffeffff) 05:55:09 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x189000, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000080)={{0x0, 0xffffffff80000000, 0x5, 0x101}, 'syz1\x00', 0x16}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0xfffffffffffffd49) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000100)={'nat\x00'}, &(0x7f0000000180)=0x54) 05:55:09 executing program 3: 05:55:09 executing program 2: 05:55:09 executing program 0: 05:55:09 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x500, 0x0) ioctl$IMDELTIMER(r0, 0x80044941, &(0x7f0000000080)=0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x7fffffff, 0x80000) write$P9_RWRITE(r1, &(0x7f0000000080)={0xb, 0x77, 0x1, 0x7}, 0xb) 05:55:09 executing program 3: 05:55:09 executing program 2: 05:55:09 executing program 0: 05:55:09 executing program 3: 05:55:09 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:09 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r2, 0x2, 0x70bd25, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r3 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x7fffffff, 0x7e) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$VIDIOC_ENCODER_CMD(r3, 0xc028564d, &(0x7f0000000180)={0x3, 0x1, [0x939bf87, 0x2cfd6314, 0x5759b9f2, 0x9149, 0x7f, 0x81]}) getrusage(0x1, &(0x7f00000002c0)) 05:55:09 executing program 0: 05:55:09 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xb, 0x7f, 0x2, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r0, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000100)={r0, &(0x7f0000000340)="565002917f0335663de527d9c65d7e6b9a4191c336a8ea00b63960cebfa4ffc7cb1f2cf2a6ad578cef7fad716e148ec794209244e006588b9dcf085053f918edfc70080d7ac8fcb5f078353ad1b74ba2b386591ad144744a1510362cd07928568a58ff7fd9eeddb02e44e806bd5cdf15e856b4bbb4e28a3c4cb4cd8e50b2b819604da09af083f7a81de27fc056eb87141b7507ba605be5a6a58afe609b7cf9af1009326f0376fcf87ae50352f39e259e415a43a385504031b32f69fcd6989e8bdec7dc78086f08cfba8e89cbbd053808442386fdd52c", 0x0}, 0x18) 05:55:09 executing program 3: creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 05:55:09 executing program 2: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() pselect6(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3b) 05:55:09 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0x2, 0x0) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = creat(&(0x7f0000000400)='./file0\x00', 0x80) r2 = accept$alg(r1, 0x0, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) perf_event_open(0x0, r3, 0x0, 0xffffffffffffffff, 0xffffffffffffffff) rt_sigsuspend(&(0x7f0000000200)={0xffffffff}, 0x8) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000440)={{0x4, 0x6, 0x0, 0x10001}, 'syz0\x00', 0x1f}) epoll_create(0x0) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000005c0)={0xb, @win={{0x101, 0x2, 0xffffffffffffffb6, 0x8}, 0x7, 0x6, &(0x7f0000000540)={{0x9, 0x3, 0xff, 0x80000001}, &(0x7f0000000500)={{0x6, 0x9, 0x401, 0x2}, &(0x7f00000004c0)={{0x44a, 0x9, 0x5, 0x5}}}}, 0x100000001, &(0x7f0000000580)="111e15950f7352fc38837acbaeb1f09cc1160a6aea235a4460657bcb04935092a94c647ec0744e2d2f7c", 0x687}}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r5 = syz_open_dev$usbmon(&(0x7f0000000700)='/dev/usbmon#\x00', 0x0, 0x200) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r5, 0xc0105303, &(0x7f00000002c0)={0x1, 0xfffffffffffffff7, 0x5}) r6 = syz_open_dev$vcsa(0x0, 0x0, 0x2) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000300)=0x8f, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$DRM_IOCTL_RES_CTX(r6, 0xc0106426, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{}, {0x0}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r6, 0xc010641d, &(0x7f0000000100)={r7, &(0x7f00000000c0)=""/15}) setsockopt$inet_dccp_int(r6, 0x21, 0x6, &(0x7f00000001c0)=0xfffffffffffffffd, 0x4) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f00000006c0)=0x8, 0x4) 05:55:09 executing program 0: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) ptrace$setregs(0xffffffffffffffff, r0, 0x0, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x0, 0x0) 05:55:09 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:10 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40, 0x0) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000080)=0x97) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r0, 0xc0305616, &(0x7f00000000c0)={0x0, {0xfffffffffffff83f, 0x10000}}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 863.407622] ptrace attach of "/root/syz-executor2"[5384] was attempted by "/root/syz-executor2"[5385] [ 863.426521] Unknown ioctl 28676 05:55:10 executing program 2: r0 = syz_open_pts(0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x400000009, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x101000000}) read(r0, &(0x7f0000000100)=""/67, 0x43) flock(r0, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x8007, 0x16eb) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r1, 0x0) flock(r0, 0x2) flock(r0, 0x2) msgrcv(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="9d17992d54450561128074769e4a4850b390f5dc2346", @ANYRESDEC], 0x2, 0x0, 0x0) [ 863.464360] ptrace attach of "/root/syz-executor0"[5393] was attempted by "/root/syz-executor0"[5395] [ 863.470217] QAT: Invalid ioctl [ 863.499044] Unknown ioctl 1079792899 [ 863.502008] QAT: Invalid ioctl [ 863.503148] Unknown ioctl -1060088256 05:55:10 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:10 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0xd, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 863.526434] QAT: Invalid ioctl 05:55:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x4380) ioctl$ASHMEM_GET_PIN_STATUS(r1, 0x7709, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000080)={0x7, 0xffffffff80000001, 0x8, 0x3f}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) sysfs$1(0x1, &(0x7f0000000000)='/dev/kvm\x00') 05:55:10 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x1, [0xff]}, &(0x7f00000000c0)=0xa) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000100)={r1, 0x1}, &(0x7f0000000140)=0x8) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x20, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:10 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200, 0x8) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f00000000c0)=""/86) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000140)={r0, 0x50, &(0x7f00000002c0)}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x400, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000040)=0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='ne\xeagoy\n\xfb8p/di\x0f\x80\x82\x0fk\xe8\xb9\xc3\x92\x06n\xc3D\xc8n\xa28\f\x14n\x90\x88\xc6\xcc\x1fX\x17\xeb\x05\x93\xee&_.\t\xf2.\x00]\n\x97\xd4\xad=\'\x1b@X\xc9:\x12\xf3\xdc\"\x17\xc4\xb4\f\x89\bPq!\xeb\xc4\xa9\x0e\xd3\xdd\xea\xb37O\xac\xb0\xbfz \xfe\xddt\xbcX\x06{\x1c\x8e\f\xa0\xcb\xb8\xd3eh\xfe\x1d\xec\xe0\xa3\r\xa33') preadv(r2, &(0x7f0000000480), 0x20000000000000f2, 0x7ffffffff000) 05:55:10 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) connect(r0, &(0x7f0000000140)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x80) r2 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) read$eventfd(r2, &(0x7f0000000080), 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) dup3(r1, r0, 0x0) setsockopt$sock_int(r0, 0x1, 0x35, &(0x7f0000fb6ffc)=0x1, 0x4) 05:55:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r2 = signalfd4(0xffffffffffffffff, &(0x7f0000000000), 0x8, 0x0) r3 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f000001bff4)={0x2007}) r4 = gettid() signalfd(r2, &(0x7f0000392ff8)={0xffffffffffff0000}, 0x8) rt_sigprocmask(0x0, &(0x7f0000000040)={0x8000000004}, 0x0, 0x8) timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r4}, &(0x7f0000044000)) epoll_pwait(r3, &(0x7f0000000100)=[{}], 0x1, 0xb6f0, 0x0, 0x0) dup3(r1, r3, 0x0) timer_settime(0x0, 0x0, &(0x7f0000040fe0)={{}, {0x0, 0x9}}, 0x0) [ 864.225445] Unknown ioctl 28676 05:55:10 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x20000, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/qat_adf_ctl\x00', 0x800, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001780)='/dev/ubi_ctrl\x00', 0x200000, 0x0) syz_open_dev$vcsa(&(0x7f00000017c0)='/dev/vcsa#\x00', 0x5, 0x101000) openat$mixer(0xffffffffffffff9c, &(0x7f0000001800)='/dev/mixer\x00', 0x6000, 0x0) syz_open_dev$cec(&(0x7f0000001840)='/dev/cec#\x00', 0x1, 0x2) r0 = syz_open_dev$dmmidi(&(0x7f0000001880)='/dev/dmmidi#\x00', 0x2, 0x0) accept$alg(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:10 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:10 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) fcntl$notify(r0, 0x402, 0x80000008) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000080)=0x0) mq_notify(r1, &(0x7f00000000c0)={0x0, 0x1, 0x1, @tid=r2}) 05:55:10 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x0, 0x0) getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)) ioctl$TUNSETGROUP(r1, 0x400454ce, r2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x120, 0x36b) accept4(r0, &(0x7f0000000280)=@x25={0x9, @remote}, &(0x7f0000000300)=0x80, 0x800) setsockopt$sock_int(r0, 0x1, 0x23, &(0x7f0000000040)=0x1, 0x7068a81a753b9b84) write(r0, &(0x7f00000001c0), 0x0) recvmmsg(r0, &(0x7f0000000d80)=[{{&(0x7f0000000140)=@l2, 0x80, &(0x7f0000000580), 0x0, &(0x7f00000005c0)=""/212, 0xd4}}], 0x1, 0x2000, &(0x7f0000000e40)) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000080)=0x3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) fcntl$setown(r0, 0x8, r3) [ 864.275050] Unknown ioctl 1079792899 [ 864.275903] Unknown ioctl -1060088256 05:55:11 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:11 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x3, 0x7, 0xffffffff, 0x6, 0x1, r0, 0x4}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:11 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'bond_slave_0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x1, 0x3, &(0x7f0000346fc8)=@raw=[@call={0x85, 0x0, 0x0, 0x23}, @exit, @ldst={0x0, 0x2, 0x7, 0x0, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff}], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], r1}, 0x48) 05:55:11 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x40, 0x4) sendmsg$nl_route(r1, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4010}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=@getroute={0x14, 0x1a, 0x300, 0x70bd25, 0x2, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x20004044}, 0x24008084) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:11 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) fcntl$setsig(r0, 0xa, 0x35) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80, 0x0) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000080)={0x9, 0x85, 0x1ff, 0x6, 0xffffffffffffff00}) 05:55:11 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x40, &(0x7f0000000080)={'mangle\x00'}, &(0x7f0000000000)=0x54) 05:55:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) pipe2$9p(&(0x7f0000000080), 0x80000) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 05:55:13 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) r2 = epoll_create(0xd33) ioctl$TCSETS(r0, 0x5402, &(0x7f00000001c0)={0x8000, 0x2, 0x100000001, 0xb797, 0xc, 0x3, 0x0, 0x1, 0x9, 0x824e, 0x1ff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) ioctl$VIDIOC_DECODER_CMD(0xffffffffffffffff, 0xc0485660, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000180)) r3 = socket$l2tp(0x18, 0x1, 0x1) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000100)={0x4}) ppoll(&(0x7f0000000140)=[{r2}, {r0}], 0x2, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) close(r1) 05:55:13 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x87) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x10000, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) ioctl$VIDIOC_QBUF(r1, 0xc058560f, &(0x7f0000000100)={0x6bcd, 0x4, 0x4, 0x400000a, {r2, r3/1000+30000}, {0x7, 0xe, 0xfff, 0x1000, 0x5, 0xc5, "54e1378d"}, 0x3, 0x0, @planes=&(0x7f00000000c0)={0x9, 0x200, @mem_offset=0x401, 0x6}, 0x4}) accept$alg(r0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$bt_cmtp(0x1f, 0x3, 0x5) epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) write$P9_RREADLINK(r1, &(0x7f0000000180)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:13 executing program 1: r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0), 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$negate(0xd, r0, 0x1000, r1) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 05:55:13 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:13 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = fcntl$getown(r0, 0x9) sched_setaffinity(r1, 0xfffffffffffffd69, &(0x7f0000000000)=0x6) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="30000000000000000000000000000000000035ec6e400e58185d31cda78fb78f381f00a8a21862da35b6f39b9844c23d5d623dc13ca31c02933d6064edc7b413333fc84bc53d897bf8c46147613c3daff16f3489629f2fe3ecb80c15c184ddb3b8a8b6fc18a8cd1173c48882eb2d36c91fc3ec089b77cc6766ba3edf78abb5c00b6b6441a4b16817f4da57784c7bc776be315a0cc3cee9c5602606c2204fa51d0d89c0aa389cdf439cf6af424e600c0877025a18c8a9296e4fcc9fccd254bc0e3866aa7938e62e468a8ccc0da4eeb3eb09a7d4e3746b587b1f5e1bbe586947485387f701a804db13d12e71132ab04f176a97c6313f6dfa8340"], 0x30}, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 05:55:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) pipe2$9p(&(0x7f0000000080), 0x80000) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x5, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) 05:55:13 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r0, &(0x7f0000000040)="01a30d0d27bf0edce63e2590b4defe2253fbd7bb4bb72e62755a0f83", &(0x7f0000000180)=""/167}, 0x18) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x183) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f0000000240)=0xbc, 0xfffffffffffffedc) 05:55:13 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) mbind(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000040)=0x2, 0x80000000, 0x4) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x8001, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) sendto$inet6(r3, &(0x7f0000000580)="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", 0x5a1, 0x8000, 0x0, 0x0) write(r3, &(0x7f00000001c0)="67d70a8fdc6a9feb9c679834", 0xc) 05:55:13 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000100)={'ip6gretap0\x00', {0x2, 0x4e24, @loopback}}) r1 = getpid() r2 = syz_open_procfs(r1, &(0x7f0000000040)='net/rt6_stats\x00') perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f0000000080)=0xfff) epoll_create(0x0) ioctl$RTC_VL_READ(r2, 0x80047013, &(0x7f00000000c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:13 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x8, 0x20040) fgetxattr(r0, &(0x7f0000000080)=@random={'security.', ':self\x00'}, &(0x7f00000000c0)=""/105, 0x69) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x1ff, 0x4, 0x0, r0, 0x1f}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) fcntl$dupfd(r0, 0x406, r1) 05:55:13 executing program 2: truncate(&(0x7f0000000000)='./file0\x00', 0x10000) msgctl$IPC_STAT(0x0, 0xfffffffffffffffe, 0x0) [ 867.099670] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 867.334012] net_ratelimit: 20 callbacks suppressed [ 867.334021] protocol 88fb is buggy, dev hsr_slave_0 [ 867.344157] protocol 88fb is buggy, dev hsr_slave_1 05:55:14 executing program 0: unshare(0x20000200) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/mnt\x00') setns(r0, 0x0) clone(0xc0200100, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x5, 0x80000) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000080)={r2, 0x2, 0x13, "1e94084770b438eec41cc0cfb8a84a45ca5ced5bdacad7796730343b43e83ba31bee3c2f143ad6d7c7e03a20af962282f7bab558e4724cacea9f7fa26c64f1c708637912947507"}) 05:55:14 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:14 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0xb2, 0x8000, 0x0, 0xd60, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000000c0)={r1, 0x1, 0x100, 0xc6e}, &(0x7f0000000100)=0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x4, 0x1, 0x2000000}, 0x1b9) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:14 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2, &(0x7f00000000c0)=0x201, 0x4) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='veno\x00', 0x5) sendto$inet6(r1, &(0x7f0000000280), 0x0, 0x20000004, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000340), 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) tkill(r2, 0x401104000000016) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x210000, 0x0) ioctl$KDSKBLED(r3, 0x4b65, 0x2) 05:55:14 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400000, 0x1) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 05:55:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r2, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f00000000c0)={0x2, @sdr}) 05:55:14 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000140)=ANY=[@ANYBLOB="ac1414aaac1414bb010000000200000000000002e0000002170e00b724f9b3db43dd5ebbd79160ed6ab72cd95c5d8b537ff45047994a62b96445780000bc8a07e2a61fc53f198347879fa77fab513b30ca6b05a3b9ae0efee33ceb3fa962d05e75bfd858ba4bb5950cdac85ea17a2f08"], 0x18) epoll_create(0x95) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000100)={0x3f}, 0x4) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f00000000c0)={0x5, 0x2, 0x2, 0x8, 0x100000000, 0x5, 0x6}) 05:55:14 executing program 2: syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x62, 0x200000) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x400) syz_open_procfs(0x0, &(0x7f00000000c0)='net/rfcomm\x00') r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm_plock\x00', 0x143000, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x80800) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000100)='.]wlan1(\x00', 0xffffffffffffffff}, 0x30) fcntl$lock(r1, 0x26, &(0x7f0000000180)={0x1, 0x0, 0x1, 0x8001, r2}) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x338d, 0x623cf70c, 0xfffffffffffffffe, 0xffffffffffffffff, 0x200000000000000}, 0xffffffffffffff82) [ 867.574043] protocol 88fb is buggy, dev hsr_slave_0 [ 867.579207] protocol 88fb is buggy, dev hsr_slave_1 05:55:14 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_SUBDEV_G_SELECTION(r1, 0xc040563d, &(0x7f0000000040)={0x1, 0x0, 0x102, 0x1, {0x4, 0x400, 0xfff, 0xfffffffffffffffe}}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:14 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 867.649639] IPVS: ftp: loaded support on port[0] = 21 05:55:14 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) getpeername$unix(r1, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) 05:55:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r2, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f00000000c0)={0x2, @sdr}) [ 867.814083] protocol 88fb is buggy, dev hsr_slave_0 [ 867.819264] protocol 88fb is buggy, dev hsr_slave_1 [ 867.824454] protocol 88fb is buggy, dev hsr_slave_0 [ 867.829535] protocol 88fb is buggy, dev hsr_slave_1 [ 867.834701] protocol 88fb is buggy, dev hsr_slave_0 [ 867.839770] protocol 88fb is buggy, dev hsr_slave_1 [ 867.973299] IPVS: ftp: loaded support on port[0] = 21 05:55:16 executing program 0: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000100)=0x0) capget(&(0x7f0000000140)={0x19980330, r0}, &(0x7f00000001c0)={0x355, 0x8001, 0x8, 0xc9ed, 0x9, 0x6}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="387cabca7d9795fdc20000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001800120008000100677265000c0002000800110000000000"], 0x38}}, 0x0) r2 = getpid() ptrace$getregset(0x4204, r2, 0x1, &(0x7f00000000c0)={&(0x7f0000000000)=""/12, 0xc}) 05:55:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r2, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f00000000c0)={0x2, @sdr}) 05:55:16 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:16 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f00000000c0)='\x00', 0x0}, 0x18) 05:55:16 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) accept$alg(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r2, 0x8}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r2}}, 0x18) r3 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r3, 0xc0d05640, &(0x7f00000000c0)={0x2, @sdr}) [ 869.995069] Unknown ioctl 3 05:55:16 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x2c, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 870.036080] Unknown ioctl 3 05:55:16 executing program 0: r0 = open(&(0x7f0000000300)='./file0\x00', 0x250002, 0x100) openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x840, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000400)='/dev/cachefiles\x00', 0x400, 0x0) accept4$inet(r1, &(0x7f0000000380), &(0x7f0000000440)=0x10, 0x7fffc) connect$l2tp(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tp={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @loopback}, 0x1, 0x2, 0x3, 0x1}}, 0x26) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x4082, 0x0) r3 = getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, r0, 0x0, 0xa, &(0x7f0000000180)='/dev/null\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r2, 0x0, 0x7, &(0x7f0000000100)='queue1\x00', r4}, 0x30) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000800}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x24, r5, 0x1, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x2}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x6460dd1b6eb14dc8}, 0x24000090) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000040)={0x7, 0x0, 0x9, 'queue1\x00', 0x8}) 05:55:16 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:16 executing program 2: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x5, &(0x7f0000001500)={0x0, @in={{0x2, 0x4e20, @broadcast}}}, 0x84) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/pid\x00') setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000040)={{0x3f, @remote, 0x4e21, 0x3, 'ovf\x00', 0x1c, 0x800, 0x6b}, {@empty, 0x4e21, 0x0, 0x0, 0x4, 0xc54e}}, 0x44) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(0xffffffffffffffff, 0x111, 0x3, 0x1, 0x4) clone(0x4000002102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000340)) 05:55:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) fcntl$dupfd(r1, 0x0, r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x44002, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000380)={0x0, 0x441}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000400)={0x0, 0x57, "98084f4b37f027d1c970faddc3fbc425eb5f302b3165a0ab56e2e72787a94d0c38358cd5c083d1e98ab541b8865637970e1931539afad8550767b46eeda0b7fac249acac25f62a2f1f1517fcb4039194b22793a3a8a2b9"}, &(0x7f0000000480)=0x5f) getsockopt$inet_sctp6_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000004c0)={r3, 0x8, 0x1ff, 0xa7f0, 0x7, 0x2, 0x10000, 0x4, {r4, @in={{0x2, 0x4e20, @loopback}}, 0x7, 0xffffffff, 0x9, 0x3f63, 0x1000}}, &(0x7f0000000580)=0xb0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x4}) 05:55:16 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0xfffffffffffffe35) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x20000004, 0x338d, 0x2, 0x0, 0x1}, 0xfffffffffffffc9f) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:16 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x1) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:16 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000009000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@text32={0x20, &(0x7f00000001c0)="b8010000000f01c166b8af008ed066baf80cb8bcf40c83ef66bafc0c66b8070066eff4f40f01c90f019d83d28ece66ba2100b09eee8fe97c81c00f08", 0x3c}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000000)={0x800, 0xa982, 0x201, 0x81, 0x3, 0x49, 0x80000000, 0x5, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000100)={r4, 0x32}, &(0x7f0000000180)=0x8) ioctl$KVM_RUN(r0, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 05:55:17 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80008101}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x154, 0x19, 0x410, 0x70bd2d, 0x25dfdbfb, {0xc}, [@typed={0x8, 0xc, @pid=r1}, @nested={0x120, 0x4c, [@generic="64c157b951cd33dd96cf044ac3d542bde31b195cab290a785725c46e7623042c06ebac7ad1bd11f86f58c9fe88a7425ec2499d25d252210c6e817be428012ca2f9e8b3d9da1de7f6d632b3da54402ea51ada34ea45bc06b59905dfd2729ace30b3777e28091b6fea4540d04098e88588861a5211ebcbddacaa81197373c73cd930d40095e8ad6afd273b82d647881f9f0e77cfc27db0236d73577898580de7582f94e33c", @typed={0x14, 0x5b, @ipv6=@local}, @typed={0x8, 0x82, @u32=0x9}, @generic, @generic="35674d40ee0be19085116346c292a7c0196ca5f95d727dc6b9f846dcdb97136295b05b46875a31115f6faa4431fb95447e5f6cb8a5dc787e52dd9985939fda8844d8bab4", @typed={0x4, 0x5c}, @typed={0x8, 0x2c, @u32=0x6}, @typed={0x8, 0x4, @ipv4=@broadcast}, @typed={0x4, 0x68}]}, @nested={0x18, 0x66, [@typed={0x14, 0x8, @ipv6=@mcast2}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x2000c884}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x2) sendmsg$nl_route(r2, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f000000b000)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001800210000000000000000001c140000fe0000010000000008a70d0000000000ecaa6bde91ace8b8bc6487f6ac67e6090b934c7b78cc4b8f86365468242b269836f6d55ff859d7df87174094f8ad7726c90c92b8c28f994c58a865f97bb8326dac8095685e"], 0x24}}, 0x0) 05:55:17 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={0xffffffffffffffff}) accept$alg(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) write$selinux_attr(r0, &(0x7f0000000040)='system_u:object_r:dbusd_exec_t:s0\x00', 0x22) syz_open_dev$vcsa(0x0, 0x1, 0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) getsockname$netlink(r2, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 05:55:17 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0xfffffffffffffffd, &(0x7f0000000180)="0adc1f023c123f31090070") r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x109100, 0x0) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000080)="bf682c8e3d630f2f82a8d140c98163addf8a46edd2c70a8282461f4db9548d688a52a27e8dd852b1bba748a5b241e99c") r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) renameat(r2, &(0x7f0000000140)='./file0\x00', r0, &(0x7f00000001c0)='./file0\x00') ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000100)={r2, 0x0, 0x3}) 05:55:17 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x8000, 0x0) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f00000004c0)=0x400, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000080)={0x0, 0xfffffffffffffffa, 0x101, 0x80000001, 0x5fd, 0x1000, 0x5, 0x1, {0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x1000, 0x8000, 0x200, 0x6, 0x2}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000180)={r2, 0x3f}, &(0x7f00000001c0)=0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) pivot_root(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)='./file0\x00') sendmsg$unix(r1, &(0x7f0000000440)={&(0x7f0000000200)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000600)=[{&(0x7f00000002c0)="ce0a841f07320d492a00b3013e98c4bcda4bec580b0c99fde0810ccba86c60161c89c6cbb5a1620ec7d50859e1683461bf1cb6d10650897b474533de01", 0x3d}, {&(0x7f0000000300)="c3425b3409f67b997fe3add174d9492020cc7187d37b1e5cb84059f4c70805ce7bfd480d69be43fd030c9c5a50a440eabe51f43d54e7e709a6c1037affeabb1e70", 0x41}, {&(0x7f0000000380)="cb6bb8baacf0056f2861b361c4d679e100bfae9e2e78b49aa90839035d058cd4544b1c5df506f76e2f21ac36d7c0c9711290447e9cb1a8cde1578795", 0x3c}], 0x3, 0x0, 0x0, 0x4000000}, 0x4000080) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000580)=@sack_info={r3, 0x8000, 0x1}, &(0x7f00000005c0)=0xc) ioctl$KDGKBDIACR(r1, 0x4b4a, &(0x7f0000000640)=""/228) 05:55:17 executing program 3: r0 = socket$inet(0x10, 0x3, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000003c0)='veth1\x00', 0x374) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xfffffffffffffeb8) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000500)='bbr\x00', 0x4) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000680)="4c0000001200ff09ff1cfe956fa283b724a6008000000000000008000000150024001d001fc41180b598bc593ab6821148a730de33aa46ffecfde0258823dd8da49848c6cea97da172dcc121", 0x4c}], 0x1}, 0x0) 05:55:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x8082, 0x0) preadv(r0, &(0x7f0000000080), 0x36d, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/btrfs-control\x00', 0x102, 0x0) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, &(0x7f0000000100), &(0x7f0000000200)=0x4) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000240)={0x0, 0x9, 0x20}, &(0x7f0000000280)=0xc) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f00000002c0)={r2, @in6={{0xa, 0x4e22, 0x3, @mcast2, 0x8000}}, 0x9, 0x8}, &(0x7f0000000380)=0x90) 05:55:17 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000040)="65cf617a8f9c91cb1734e1c7b3b97f41a181a2e47afbe6dc4113ced6a7c0c8ed5977310ee0c29e85453cb9d9b60f1fcb165a351151233b8ae441319c2f756d7c2e5cd9c99d306bb67b169d70b7dfdc08b695f40491a6e0532d0369b28802e13a3bc6b3aeef1e5d893f14a74e9c7f5052d0f091e692302abfbad7101b0aaa2cb47438c25d4b77f455df7e0afedcad160c2bee7a19155dd6fd9f95bdc9646d3aa6213c56e0a8113a28b819de3cccf4b70ca1b8a14900bf37e654f53c3ee4a228679982746dd1945eafbd8c5a8240c3a053a41677a1c0443fc5e29735b05de220e1a7cd031481a79ef781687b24", 0xec) 05:55:17 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 1: getpid() recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x1, 0x2) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r4, 0x111, 0x1, 0x0, 0x4) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x0, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r5, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r6, 0x0, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x6}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0x40800) syz_kvm_setup_cpu$x86(r5, r2, &(0x7f000000c000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 05:55:17 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) fsetxattr$security_smack_transmute(r0, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) r1 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup2(r3, r2) r5 = getpid() r6 = getpgrp(r5) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000300)={0x0, @dev, @multicast1}, &(0x7f0000000340)=0xc) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={@empty, @mcast2, @loopback, 0x5, 0x8, 0x3, 0x0, 0x1, 0x10000, r7}) kcmp(r5, r6, 0x7, r4, r1) unlink(&(0x7f00000002c0)='./file0\x00') accept4$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c, 0x800) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xfffffffffffffff8) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000180)={0x1}) 05:55:17 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) arch_prctl$ARCH_SET_GS(0x1001, 0x0) epoll_pwait(r0, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x20, &(0x7f0000000080)={0x9}, 0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = accept4(r0, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000000c0)=0x80, 0x800) getsockname$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000140)=0x1c) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/am_droprate\x003A}\xa5\x85\x00\x99\xc4\xd0*\xcc\x1bM\xf6\xda\xe3\r\x11\x06\xf58D\xa8\xde\xb8\xf5\xfc\xc1\x8b\xd9\f\xd3\xc3l\x9a\xfd`*\x14\xfd\xd6+\xe2\xa4\a\xeb\xe8\xb8R|L\xc1', 0x2, 0x0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f00000001c0)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) fcntl$getown(r0, 0x9) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x6, &(0x7f0000001500)={0x0}, &(0x7f0000000000)=0x98) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r2, &(0x7f0000000240)="1ae5567c0a672639cedd0774cea48af1cd2264cfd5d6c0e6d9b4c90482134b9b653d48513b9cb9a419e6257b403ce61e67685aeb1e57929bed7d3c76eda9017f259b00b7d6f75429ada0e227a373ae2cf5007807630f66badafa9aeccbdbf72ff53560a9fa6afcd33cd1e6ab260bbc11239f81520e86272d4976d45e35c02a9758a5e464c606c585928402d21f5b13b8a1387c2ecf907ea55365130015653ed8c06da91ef81d059e75ef0791cfe9475dec7166050caa3dc5dfd279bcf98f90a61dbd610930c78c85c883e2d6d3d849e4a8ce9748fb990e5be20772a5fd529be0120e2825a96c61c532a36c050a4d3d04cec2f52ba4fa655e19da26f7f0570097b1dc2a55c82d73c6ca56468128527f3ea7af330209876a1cdb6eee93181dc8261c57eb78ce2dea51258769dd0b5c3b740315d755f0ed6cc6c60a", 0x13a) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={r1, 0xffff}, &(0x7f0000000080)=0x8) 05:55:17 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x90200, 0x0) syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x1, 0x2) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/btrfs-control\x00', 0x2000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x4, 0x338d, 0x2, 0x0, r0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:18 executing program 2: connect$unix(0xffffffffffffffff, 0x0, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f00000001c0)="b33db29ab98497069cd513e202dd9e40f5dc53ba06ddad2e09ce797a696f45deee63934fb057ecfd7a74313f86321d7161341cd9da8c1b49b4ef81c812aadb8a0397a1944187d5a5138187664683fbf660303c941bf6f15e5331ab5fde5ff67fcdee52408b917dd05a2e0b8df649bbb8bae9", 0x72) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x101100, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x104, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x28}, 0x1, 0x0, 0x0, 0x24040855}, 0x4) sendmmsg(r0, &(0x7f0000005b40), 0x40000000000014d, 0x0) 05:55:18 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_tables_targets\x00') fallocate(r0, 0x2, 0xfffffffffffffe74, 0x3) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 05:55:18 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:18 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20400010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@getrule={0x14, 0x22, 0x20, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40080) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:18 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x6, 0x408100) fcntl$setlease(r0, 0x400, 0x1) setsockopt$RDS_GET_MR(r1, 0x114, 0x2, &(0x7f0000000280)={{&(0x7f0000000180)=""/167, 0xa7}, &(0x7f0000000240), 0x2}, 0x20) setsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000140)={@empty, @rand_addr=0x7f}, 0x8) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)={0x1}) setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f00000003c0)=0x3, 0x4) chdir(&(0x7f0000000040)='./file0\x00') fcntl$addseals(r0, 0x409, 0x4) 05:55:18 executing program 1: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) recvmmsg(r0, 0x0, 0xfffffffffffffe42, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x6, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000180)=0x8a40, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') r3 = dup(r2) getpeername(r0, &(0x7f0000000080)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000000100)=0x80) ioctl$DRM_IOCTL_WAIT_VBLANK(r3, 0xc018643a, &(0x7f0000000040)={0x2800003e, 0x8, 0x39}) utimensat(r1, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)={{}, {0x77359400}}, 0x0) 05:55:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0a5c1f023c126285719070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000400)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000001c0)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) prctl$PR_GET_CHILD_SUBREAPER(0x25) r2 = accept$alg(r1, 0x0, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x13f, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r3, &(0x7f00000002c0)={0xa, 0x4, 0xfa00, {r4}}, 0xc) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xffffffaa) ioctl$CAPI_GET_FLAGS(r2, 0x80044323, &(0x7f0000000480)) recvmmsg(r2, &(0x7f0000000000)=[{{&(0x7f0000000080)=@ll, 0x80, &(0x7f0000000680)}}, {{&(0x7f0000000200)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000380)=""/113, 0x7ffff000}], 0x1, &(0x7f0000000300)=""/73, 0xfffffe91}}], 0x40000000000006c, 0x0, 0x0) 05:55:18 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:18 executing program 3: setxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000000c0)=@v2={0x2000000, [{0x100000001, 0x101}, {0xa4, 0x1400}]}, 0x14, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f00007b1000), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00007f2000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2) vmsplice(r0, &(0x7f0000e79000)=[{&(0x7f00003fb000)="f7", 0x1}], 0x1, 0x0) mbind(&(0x7f00003b5000/0x800000)=nil, 0x800000, 0x0, &(0x7f0000000080), 0x1, 0x3) bind$inet(0xffffffffffffffff, &(0x7f0000e5b000)={0x2, 0x0, @multicast1}, 0x10) 05:55:18 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x8000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338b, 0x2, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:18 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000040)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000040)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000000040), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="20000000000000008400000002000000000000000000000000000000cc6994f82559ee8152386f7d15e53baac45d10a4"], 0x30}, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x220201, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, r2, 0x2, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100000001}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x108}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40014}, 0x10) sendmmsg$inet_sctp(r0, &(0x7f0000000080)=[{&(0x7f0000000180)=@in={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10, &(0x7f0000562000), 0x0, &(0x7f00000c3000)=[@sndinfo={0x20, 0x84, 0x2, {0x0, 0x241}}], 0x20}], 0x4924924924924d0, 0x0) 05:55:19 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000000400)={"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"}) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x48000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000900)=0x0) perf_event_open(0x0, r2, 0x9, 0xffffffffffffffff, 0x9) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f00000000c0)={0x2, {0x3, 0x0, 0x1, 0x66, 0xffffffffffffff64, 0x8001}}) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0x40, {{0x2, 0x4e20, @rand_addr=0xea}}}, 0x88) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) r3 = epoll_create(0xfffffffffffffffc) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10000009, 0x4, 0x338d, 0x2, 0x0, 0x1, 0xfffffffffffffffd}, 0x2c) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x827, 0x9, 0x1, 0x140, 0xffff, 0x5, 0x8, {0x0, @in={{0x2, 0x4e21, @multicast1}}, 0x9, 0x8000, 0x1, 0xffff, 0x80}}, &(0x7f0000000240)=0xb0) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000380)={r5, 0x80}, 0x8) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0xe0c, 0x200) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000002c0)=ANY=[@ANYBLOB="030000000000000000400000000000003800000000000000", @ANYPTR=&(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000000d0010000000000fd00000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="000000000000000001000000000000009500000001000000", @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1f, &(0x7f0000000580)={@ipv4={[], [], @local}, 0x0}, &(0x7f00000005c0)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000600)={@ipv4={[], [], @rand_addr=0x6}, 0x8, r1}) sendmsg$nl_xfrm(r0, &(0x7f0000b2f000)={&(0x7f000000f000), 0xc, &(0x7f0000beeff0)={&(0x7f0000131000)=ANY=[@ANYBLOB="3801000010001307000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000000000ffff00000000000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000048000200637473287874732d73657270656e742d617678322900000000000000000000000000000000000000000000000000000000000000000000000000000000000000ecfdffff"], 0x138}}, 0x0) 05:55:19 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000080)) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 872.626362] netlink: 72 bytes leftover after parsing attributes in process `syz-executor2'. 05:55:19 executing program 0: unshare(0x200) socket$inet6_sctp(0xa, 0x1, 0x84) syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xc0000, 0x0) select(0x40, &(0x7f0000000140)={0x1f}, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 05:55:19 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x400000, 0x0) setsockopt$sock_void(r0, 0x1, 0x614168d0790f5eeb, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_buf(r1, 0x1, 0x101c, &(0x7f0000000180)=""/213, &(0x7f0000000040)=0xd5) 05:55:19 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x6, 0x338d, 0x0, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 2: r0 = socket(0x10, 0x460cafb911c8a67, 0x80000001) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) writev(r1, &(0x7f0000fb1000)=[{&(0x7f00000000c0)="480000001400197f0900a30101048c590a88ffffff011a01000003c286d9bcf02500020028213ee20600d4ff5bffff00c7e5ed5e00000000000000000000eaf60d18125d4b18857a", 0x48}], 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f0000000140)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xf}}}, 0x3, 0x1}, &(0x7f0000000000)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x26d88f2, 0xffff, 0x0, 0x8, 0xff7, 0x8, 0x20, 0x30fb, r2}, 0x20) 05:55:19 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x393) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0x2001}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000100)={0xa, 0x1, {0x57, 0xb54a, 0x7f, {0x3, 0x11}, {0xff, 0x401}, @rumble={0xffffffffffffffff, 0x2}}, {0x56, 0x20, 0x7fffffff, {0x8001, 0xd716}, {0x8, 0x1e}, @cond=[{0x5, 0x3, 0x5, 0xd3, 0x101, 0x7ff}, {0x2, 0x8001, 0x81, 0x6, 0x95d, 0x1}]}}) r3 = dup(r1) bind$unix(r3, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e22}, 0x6e) syz_open_dev$vcsa(0x0, 0x9, 0x80001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000080)={0xffffffffffffffff}, 0x113, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0x10, 0x80800) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) recvmmsg(r1, 0x0, 0xffffffffffffffe3, 0x40000060, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @local}}, 0x1000, 0x7, 0x6b27, 0x7, 0x7fffffff}, &(0x7f0000000300)=0x98) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x9, 0x4}, 0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f00000002c0)='#', 0x0}, 0x4) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000400)={0x3, 0x9, 0x7, 0x0, 0x0, [{r0, 0x0, 0x4}, {r0, 0x0, 0x1}, {r0, 0x0, 0x6}, {r3, 0x0, 0x9}, {r3, 0x0, 0x1}, {r0, 0x0, 0x3}, {r3, 0x0, 0xf92c}]}) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000500)) rt_sigreturn() set_tid_address(&(0x7f0000000040)) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x2, 0x80000000, 0xfffffffffffffc01, 0x8, 0x8}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x22, &(0x7f0000000140)={0x6, 0x20c, 0x10001, 0x3, r5}, 0x10) 05:55:19 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r3 = syz_open_procfs(0x0, &(0x7f0000000680)='maps\x00') sendfile(r2, r3, 0x0, 0xfd) accept$unix(r3, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) r4 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r4, r0) timer_settime(0x0, 0xffffffffffffffff, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1004000000016) 05:55:19 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:19 executing program 0: r0 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000000)) ioprio_set$pid(0x2, 0x0, 0x7c3a) clone(0x28ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:55:19 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000f, 0x32, 0xffffffffffffffff, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/56) mlock(&(0x7f00003c2000/0x4000)=nil, 0x4000) 05:55:20 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, &(0x7f0000000140)="3bd020a394c126fface0f6b6011aae328864da9528cdd24bdd76afba478ab3c7891c4b3f93acc4590665") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:20 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x100, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000080)="5011a1589ec0413a7530ed50445f3ea3709d52270449c47ac7a9cef79c44021aced72465bbd034e6386651992886ce145ca1c496db4a9c8289daf48ce96632ce16cfad09f766233f49ddf95558a3", &(0x7f0000000100)="c6721561d16bb9e91385fa9ccbc600aec1fcfa33cf32dd058d686884822c56c20df4c0ab4f93d65144bd7b77bafe78f340e17714c2466f0fdb9f1b0fbfd950562e161eac4a4e6c5119582a485d761b88f9781c6636a9b0206211eadb8a6cd5e9cd1f410e77ccc3c97ac058c91191f7f070a8735e0562bc54a1de4e4083da5979609929341d2048ee13711616bc261600f1702d5a9c8d7164398be0168b75c562ed9377ca2870b0bc3905477e6ea35f", 0x2}, 0x20) epoll_create(0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f00000002c0)={0x7, 0x0, [], {0x72f1f675a1161dd7, @reserved}}) openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x103282, 0x0) 05:55:20 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:20 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getflags(r0, 0x1) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000f1dff8)) 05:55:20 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) fsetxattr$security_smack_entry(r0, &(0x7f0000001a80)='security.SMACK64\x00', &(0x7f0000001c40)='/proc/thread-self/attr/exec\x00', 0x1c, 0x2) recvmmsg(r0, &(0x7f0000001b40)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)=""/139, 0x8b}], 0x1, &(0x7f0000000140)=""/180, 0xb4}, 0x100}, {{&(0x7f0000000200)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000000700)=[{&(0x7f00000002c0)=""/126, 0x7e}, {&(0x7f0000000340)=""/117, 0x75}, {&(0x7f0000000400)=""/254, 0xfe}, {&(0x7f0000000500)}, {&(0x7f0000000540)=""/21, 0x15}, {&(0x7f0000000580)=""/146, 0x92}, {&(0x7f0000000640)=""/166, 0xa6}], 0x7, &(0x7f0000000780)=""/96, 0x60}, 0x4}, {{0x0, 0x0, &(0x7f0000001ac0)=[{&(0x7f0000000800)=""/192, 0xc0}, {&(0x7f00000008c0)=""/147, 0x93}, {&(0x7f0000000980)=""/84, 0x54}, {&(0x7f0000000a00)=""/17, 0x11}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/4, 0x4}, {&(0x7f0000001a80)}], 0x7}, 0x80000001}], 0x3, 0x100, &(0x7f0000001c00)={0x77359400}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000500)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:20 executing program 3: r0 = userfaultfd(0x0) r1 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000080), 0x80000) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000140)) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000180)) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x501000, 0x0) ioctl$SG_GET_VERSION_NUM(r2, 0x2282, &(0x7f0000000040)) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x11, 0xffffffffffffffff, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x40, 0x18) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000100)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) [ 873.574025] net_ratelimit: 20 callbacks suppressed [ 873.574033] protocol 88fb is buggy, dev hsr_slave_0 [ 873.584134] protocol 88fb is buggy, dev hsr_slave_1 05:55:20 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet(0xa, 0x801, 0x84) connect$inet(r1, &(0x7f0000000140)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000180)=0x5, 0x4) listen(r1, 0xfc0004) r2 = accept4(r1, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf4}, 0xb) recvmmsg(r2, &(0x7f0000004900)=[{{&(0x7f0000001480)=@in={0x2, 0x0, @remote}, 0x266, &(0x7f0000001700), 0x0, &(0x7f0000001740)=""/4096, 0x1000}}], 0x500, 0x1, &(0x7f0000004a80)={0x77359400}) 05:55:20 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:20 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:20 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000080)="23d8545365ab851f8fbcdeb0a18debe4b009ea93bfbe5be12262e2e04dd828c70a96ad59b3717b61386aad125eca040c56c0dd95727cc2aaa3c71e0de801c265ef3e013af6f5ef8031450226d0780d58cf5d1c2b018939fd9dffb9848880872d0fa2102477", 0x0}, 0x8) 05:55:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x3, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000003c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1000000000022, &(0x7f0000000040), 0x1f1) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000002c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x0) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0x4020565a, &(0x7f0000000100)={0x8001007, 0x7, 0x1}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$alg(0x26, 0x5, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000008a80)=[{{&(0x7f0000008640)=@xdp, 0xfffffffffffffdad, 0x0, 0x0, &(0x7f0000008840)}}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VIDIOC_G_FBUF(r0, 0x8030560a, &(0x7f0000000080)={0x0, 0x1, &(0x7f0000001180)="1a42b847305af791445d20cbdeb3933c9ab935d2820de767f3a83fa1711a01c993d26e3ae1d4e41c12d7b3e7f967a0a43de8e51908f42e69d015402521e1b324d42e2bec6674ca3a9ea596954e8674f48f50f3bd64950eb5478602ef74956b9eff6e1649d16c94c145e8193c439c94f9a802db4d0ecbbe9dcfdd13ffe7d16920ecfa6ed510beb3fc881242af370eeddec170b7906f077c05db48fc9492f84fee18547cbb7f7cdb3b0a3521f871d90be02405eaf65e39f807c6fece3da81ab98718c67654b52a285680165cd6881167eb2678c7a42a946f63060816686a651e61abc1ea0247c7a67a6e92689040dc099104d639692e59ffc05b8dc0e408dd05678f21f2cf9186f4a1211307fe991659662a4b34662d477b7ff0ce7ab6a909eea2d3bd0eaee9996cf458b14c16d3ab2a47d9707a00fbaa279ee09ce3f2a78ca4b6c951fa44e05f6e43b53744405a754c9a96940455d298497d153889b5e40cc1c071bdf6882679ab1c6f55584168f94f8458e8545d559d67e87e6a79da90f6fde6a8385204ab4b57be61d0964dcef2734d2a43a297662c9207a2d383222008eb990b4322268ed3bf980c4a92966d5b05c80b2ce94ca0e85e8a4d4493901753c1c1ded7ab6d721a23353da205093b15d6cf3cd4e064e013537633903b9e11a8a9ef31422b5a63eb4a0bec9425234babec59f3abd9b2d168803106223f41dbfa7f1cd2d4b9b7c91a1e2a3fe085253d744092c1ca12c2dabe6f64e4c797f0c78462efdca99c99c38edaba9a60c335462237b0387aaa5aa20827521984e4f20b4a1aa1da2b3c2d744cf88bbbeae981d927384c71e7c37f226e6fe19fde790b54f25e67dd4edb35afc9298eda3603686978495b79a79079960ee19fc4aef6c95c6ac2e357c72335313aba79bf32527242309a3acf8d515bf8d9b427d3a1f5b72f8116487b5630090b316631ad3868d2a994fc7be9050187bc9c89061f0f3a072bd9fa053621753ab834aaa3736781d62cab4d6ac3b925b93830b7f31251a2ecdba535c3caaaaaf1239310db89753f73acff866b60e8d29a62dff12653e828b71c9b9905ae7066592eada38a66281bb01be7dba322bdcb17f1c121e5280e1d2e3ff6fc5958371ec8ec0215f07b409e20012f708968a34ec62e33f1e1c2b1c92e9a6584e372237df121488296e5811524cf15db1f7814956b87730d54187bcff25fdf8ec86e64b75406160f91f4a6dc1222ae5989b211b5097c2b48195c55ecac71581a1d1888557a130202395011c4ca7586b29c53d1c71fdf58d99b15a325faffe6e7638ccad132ba661c6a5e18e2502d7b1cacdc7fab02a255ae7c6936ee4ddf6a546e38e088270068b9f85b7750a3007b5d53ed8a7ecbd8201c290eec4211cc2992f5a216bdd10590ef18c3a89f70df4ff260076d41101db69bb2ae0d985f7c979892ae830e616e2177fe71e67e96132163a53197bc07428c38f1cff9b83303dca8b97bcd2a3d3115f75f872d17594316c6382d399cfedc3f794880b7deb0c8aa1ea1cb94feb1b2793edd75e7d415d986bf778e4bd54e5aa17989b824c3f01f4e31aef331cc5e85a59d4c349ea00c67a071509281269113757bf3598b96a497859d35334faa799857e6e37a208a33cfa9095398c2e2f8823a551bbe3503d0148f278dc790ff3c6bd8e49485fe25fe213733594a504af3a02a47bb48d82437438be2f9fab8b55bcccbe389b26c9e58c528c6cd15c8591e35e2077da75241ad0ec35eb41a11c0af059399dc5c615f844266646282f471b5aab9b7c3bab960cef2f5976db637774d4283e748eb17df41f478138292af0acbfdf827970dabeda96f0e269ac6a7d2753bec30ab5850cfe5de50476c73a187636ee8080ab02a1af3fe79d990e3d82abf92ec1a02bec02b8aaf4f157f8a9d2f6091a39f91c69e9ff0b0738b6de7f5a504fcfd2ce0b1d4d5ded8fbf1546cbe48bd20a78ac65a51cde00263faca87b04913932865f733f8ab98d3080e06d98116d8ac8938a894434f2598538c7b7616b4034004d03b9dd359d2e5f0ae9fa25dfb86af782cfd1054f184deb000a1bd02a4500aafbb3c6225eb47e59c15950aafc1318715e540de9e1810b0e046df556b426c21381c588f6b1cb633c05fb186e2309f08df2eae7f815b5e6a29caf12c54262c1cc72316dc9c098d4a0fa173ed613a19a2f000507eda64beac48e64b621ad70b34b6f0830f5e4eee25cd6114244572aa9558163f979a629c0f7146e98331728cf35d01cbb34f9af942f0d9e1fe24e847752d9fc9105620a72248e2c40299ff9d8208a210784534b3121418bd05a4fde79134effbda6a07d9bb80b56c2196fc79d2170612f372aa11f7c99b280324af25530c71e6ae12a87443f2a9d99ad733c851eb67ad90695928ac58cb1bc74c640ea5ba8e896061c47921179fa2d06ebc812b4dc5619bb16158254f009222e493b8c586a315c7f9ca82cc83d148e4b52959896df85f6068d1e8b9b933dfa13763c5a77654db8d923c31465a4d2742851e9c78ec73b4ada4807c969e8215417647c65664826cef00d44d192d089c2ba2bd06e58679b3bc1c322ae77216fc14bc390ded3b3498d5500b5cb183827c26e5f5783e2e3572a0f71fa40274d3c8def5e71c46ab20bc85131e8defd95e8f1875722bcb5d768be0ef97142035cb75740c64fc95a9a0afbb66eea4c139aedf64d71938d4c1df484caa4fe62a02ed280da9fa6a62db22b63c0e65a98ad15a7e002de342126e0f2fa6da9d58c459713477c938c46cf17d2d4b305a099c38c5b3116c50600cd29b3f5e353f9c74126b0b61182bdc28b6131fb2699264bb1f1a88436cf727e02a7dd60d73919d8bdb89aac9fa8ed5e3c1168da3af8e6a3c4635aaf5563ba4ca78b1f1afe6652121f5faef843d0b17e6c6527612a0e591da47b9e92ec2134cedd4441bcac65852d52de30a2e516b6757295b450a93c304f1073e1d1035085e5785fd576cddb5f3fb568acdcd65ff1c042103e369c2fc598fa1689d914d4bf1528e141bcbadf46544ae435c07812d904c1898b3862caf0e0a541472234ed324d782ae91ea0077e3ae465f5770ec71598036edc864a7d506d708a89964b258a3e9755970b2371f86c681bfa0a71d73cd7667bacd0f01f57280e36d1eb5f5ca570e54e194fbcd75a9650ffa1d297f8da25d92fef42ec907925d7a892d56471eacf3914b3451102ce9b5e8d49035b42482fdc3dfc14b6fa6f6fcd83ac20762fcf75a64e15e58021152745f8639c197ca5e40bf371bda0685356af74eae2e296324aa9e8bd8192767de5b5d143cbb76a6c875475dd19ae6205640224d996a37778d7df3fdeacb208b597478ec2850e2a77664cb786766d5b1fd2ddcbb95a52e79eeae58749a957e6a11986f95b6730395eac95906d4e81e01ff19660697f49f74b8194fc0ddc65da06e025249d32b38ca66409c7c99e9202ce92565f781f8f4cacd151440b6e63d170f1edaa2f56b1c92803173fd646dbebd5b6124a5a6cc9459a1714728a374431a1ff94b39fd0b528d379cc7f4d917e50616f707055a87d4474c9035a4b94381b706860dad2d01692ceebac22fd13e78bbd65106757288ba736847bb70b3f99760479211d499a4ccf8e38a1de7ee2ff9b9eec8ceb26ec8b76dcf1cd17fb656f034db70f9e8efc66640a1574b2a1fc7a1ced64f8efa2dd1e90349df6fe649838c9507bc624443935abcb5994b08a2d34f292a83d2a5836890f98e3cb6428b074b678c45e6c6e958b97a66c2f2743e61edd0403e7b79c407de6bed13249f1067ab22f307588317ccfcfecc3d17a72dbb7b519cc58c2016392a54cf884480e65ce579bb8b8d0289cf43e51c5c2a2f0b64dba35cbd6137a97699acde98ca2684911ccdc8b07596c8f5a0b9302420d813a4ec26c96659a3a9e97cac0d6d8a8f5980ecebde1e9fa0690ce07830c1eaa656f163077d8846ae544b7536a255748f3ed234eb3bbabe242a67521181bc29506b816e41c6568d2efd19326f5675881215b8378b176951fb08b5e76360616706d1c782d9eac445891da4eae93d64370c768e6e98cbaf8a51018fcee05eaec1cd3f4b95de0967439b05db5eb9fc74d067e2a959859421d281d4accbb4a42dc88f5bb26f2ac2ea59238160ff82f0ad1fa4886988aef4fe2518b7d2fb823709e5f639f68802631655f2ee4f43897bbf3b01734d47d5c514b1b570f8e1a1b99a01abe6bc0ee3a7974623a8b748319375d0c5c58aceec3bcb5318aaad0c8476379e9e0ea2931ce72eb60d8a686a58d380e4fd9f70455b281caf2ccee2b3e3ecaaea247879add610441621985dd7ad8d4401a08c94087325582a3b1a70def6671653d9fdfd90904d5f5f65f1bfc1f482c8e5cdc4af9c8e3b11908a3a4fa6690c1d6a6229fabf4d831e6fac83ddfc33f496052149527e8860f771738a86d0d9a3ff93084bee4945e9d124fcd9bb023628191e74c7d6acdd711a3bdc40d2d441431a5bbf96dc62484e62d4404a8b199bd175ac7fe54ce74b9abbd249eae8a0a0d93bd83f6c2a385efe83f952eaa1d64462a6f02e7ac58c90bfc55a9885490bf823c7c8ded5c277715998ba341e01f26fdd6fdd8cb333239a288d5e2f7c6131aef486ea0f26b25b0f2bb745181f8919f9989ad7af06bac586243fb2ced987663696ea2811b91bc1e120b53cc666f937836b312ad0805ef368619e479ff0dc43f40ab7740d04673765308790d4b2b41dbc8e323dd76a1aca5840c3f6285a9179f118a2a1f871b1d565f494b53973b7fbb3d696adc4e316e69e6b23bfd9b963552df4de3c5c12ad5afc11a6a6c6beffbd732e188fd2da7fda84ffa7f64f642ccd84f351698af636187234fe4938f572412ab7cc2c7177cd6879b1a05edcf531ef7afc387c7d466726d10fe044f0edd4d1de0410484ecddac2030e88d5fae2b88134f223742f7a10a495f702606074e302086cf32eab872e480c932b198ee0eab6969ca6ff393e235de58482b1df907be3215c142b7279ae61500d50cffdea1a0b50037d9110a68fbd289c7931a11d1d11e2f5d2eb9b5f00f187f5d16badbf479af01d6cdd108c8e429a00a7c2ef56380ed769db7d3a97d3547331849f3a82be3893f42dd14c7afd36b187f7d08191c4e94c72fda04168b60cfe81a4c1841c279ae85dc0bb263d90ecf6e2824557369111e372f67fc9f01b2080543ce2c0379cf6258981f18ccf6b0f28e45f0ce70f2620504dd81f2e3992c45484c48883889cdc4e48222f556b371bec98204ce2baf264e4100259c6d0c5f087c98153cf77bdad75de9718933d171fabd53385aeb6e5efa94d11973c0627ee15b033dfa03248254622c8b3c587e976966e676b641afa85870c4925e485266ef7a157cb9bc8311bbc5d3553979db10d5fd306a3ba9ec05f6df6f3ac0cd6321f7cedf712b7eb281534a9beb0c05dd7714a20af068aaeb1b77860fbf89043b0286b285ed73e5188e7025e53eba3edf2e27f2a769cbfc49bb8d02ecbddd7063f845bf13ac5aa08f7fb80369a0e595c2a982cb4be6b287e53aa051a88913b8531f94e952a2135347a851c9be603833027805108e411947454598557c6585ba69ac350ebdb876778881839f3efd190df0ff8b9e83afefc3b8450b2e5f6e6126b52d5870f57f90646102059c24d5e6c732bc2022d6f4711cf3431dc8d6e6af312189c1f53cc82e9da846ae2fbb79b8d721f992214fa6bd5137473dd", {0x0, 0x103, 0x7147577d, 0x0, 0x5, 0xc1, 0xe, 0x8000}}) ioctl(r1, 0x1000008912, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, &(0x7f0000000140)=0xffffffffffffffff, 0x3c7) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x6, &(0x7f0000c86000), 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000001140)='./file0\x00', 0x3) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB], 0xf) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f0000000000)={0x8, 0x617, 0x0, 0x7, 0x7ff, 0x7fffffff}) close(r2) execve(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f0000000140)) 05:55:20 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)="02", 0x0}, 0x18) [ 873.814078] protocol 88fb is buggy, dev hsr_slave_0 [ 873.819252] protocol 88fb is buggy, dev hsr_slave_1 05:55:20 executing program 2: open$dir(&(0x7f0000000080)='./file0\x00', 0x210001, 0x50) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'crc32c-intel\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept4$alg(r0, 0x0, 0x0, 0x800) close(r3) openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) splice(r0, 0x0, r3, 0x0, 0x2003, 0x0) close(r3) write$binfmt_elf32(r1, &(0x7f00000002c0)=ANY=[@ANYPTR], 0x8) 05:55:20 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x70) 05:55:20 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x2, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:20 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0xfffffffffffffff9, 0x80) syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x5, 0x200000) syz_open_dev$midi(&(0x7f0000000180)='/dev/midi#\x00', 0x8001, 0x1) pipe(&(0x7f00000001c0)) r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x2) accept$alg(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8, 0x800) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000080)=ANY=[@ANYBLOB="030000000000000000000000000000000000000000000000000000000000000000000000feff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) pread64(r1, 0x0, 0x0, 0x2) r2 = gettid() r3 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) r5 = dup2(r4, r1) tkill(r2, 0x16) ptrace$setopts(0xffffffffffffffff, r3, 0x6, 0x0) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f00000014c0)=""/243) r7 = eventfd(0x0) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f00000000c0)={r7}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000280)={&(0x7f0000000240)=[0x7ff, 0x81], 0x2, 0x47f, 0x3, 0x0, 0x0, 0x20, {0x1ff, 0x80000001, 0x40, 0x8, 0x6, 0x1ff, 0xfff, 0xfffffffffffffffd, 0x100000001, 0x8000, 0x8c0, 0x100000001, 0x28, 0x1, "b6a159d01054c528d1ef2b5b1aeef0f61479439207d70a7dd5021a16cefc3d37"}}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001400)) semget$private(0x0, 0x1, 0x404) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) getsockopt$inet_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) renameat2(r4, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000100)='./file0\x00', 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f00000001c0)={0x3, "c35267faedd29f3cc6965ade2b899aef28fafe65da131d1efe0001f8e7fa6dc3", 0x1, 0x1f, 0x1, 0x80418, 0x200, 0x8}) syz_open_dev$sndseq(0x0, 0x0, 0x0) setpgid(r2, r2) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2d, 0x0, 0x0) [ 874.053989] protocol 88fb is buggy, dev hsr_slave_0 [ 874.059179] protocol 88fb is buggy, dev hsr_slave_1 [ 874.064396] protocol 88fb is buggy, dev hsr_slave_0 [ 874.069514] protocol 88fb is buggy, dev hsr_slave_1 [ 874.074736] protocol 88fb is buggy, dev hsr_slave_0 [ 874.079820] protocol 88fb is buggy, dev hsr_slave_1 05:55:20 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @loopback}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x2) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000280)="290000002000190000003fffffffda060200000000e80001060000040d000300ea1100000005000000", 0x29}], 0x1) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x4) 05:55:20 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) fadvise64(r0, 0x0, 0xaa, 0x7) 05:55:20 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x200003d8) 05:55:20 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) mmap$xdp(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x100000a, 0x10, r1, 0x0) 05:55:20 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000080)=r2) sendmmsg$alg(r1, 0x0, 0x0, 0x4000000) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$kcm(r0, &(0x7f0000000240)={&(0x7f00000000c0)=@ll, 0x80, &(0x7f0000000200)=[{&(0x7f0000000140)=""/161, 0xa1}], 0x1, &(0x7f00000002c0)=""/188, 0xbc}, 0x2000) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 3: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000200), 0x2) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40, 0x0) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x6c) 05:55:21 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_FREQUENCY(r0, 0x402c5639, &(0x7f0000000200)={0x0, 0xfffffffffffffffe}) accept$alg(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:55:21 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_DECODER_CMD(r1, 0xc0485660, &(0x7f0000000080)={0x6, 0x2, @stop_pts=0x2}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_smc(0x2b, 0x1, 0x0) pread64(r1, 0x0, 0x0, 0x2) r2 = gettid() r3 = gettid() timer_create(0x0, &(0x7f0000000440)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f00000010c0)='/dev/vcs\x00', 0x0, 0x0) r5 = dup2(r4, r1) tkill(r2, 0x16) ptrace$setopts(0xffffffffffffffff, r3, 0x6, 0x0) r6 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r5, 0xc008ae05, &(0x7f00000014c0)=""/243) r7 = eventfd(0x0) ioctl$KVM_IRQFD(r6, 0x4020ae76, &(0x7f00000000c0)={r7}) ioctl$DRM_IOCTL_MODE_SETCRTC(r4, 0xc06864a2, &(0x7f0000000280)={&(0x7f0000000240)=[0x7ff, 0x81], 0x2, 0x47f, 0x3, 0x0, 0x0, 0x20, {0x1ff, 0x80000001, 0x40, 0x8, 0x6, 0x1ff, 0xfff, 0xfffffffffffffffd, 0x100000001, 0x8000, 0x8c0, 0x100000001, 0x28, 0x1, "b6a159d01054c528d1ef2b5b1aeef0f61479439207d70a7dd5021a16cefc3d37"}}) ptrace$setregs(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001400)) semget$private(0x0, 0x1, 0x404) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, 0x0) memfd_create(&(0x7f0000000400)='\xe87y\xd8\x0e\xfaE\xbb\x7fH\xbe\xbc\x95\x87\v\xd0\xcd9\xbd(0\xeeG\xaf\xe7\xb3?\xc7x\xbd\xe2R\xc5\r.', 0x0) getsockopt$inet_tcp_int(r5, 0x6, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) renameat2(r4, &(0x7f0000000080)='./file0\x00', r4, &(0x7f0000000100)='./file0\x00', 0x2) ioctl$VIDIOC_ENUMINPUT(r4, 0xc050561a, &(0x7f00000001c0)={0x3, "c35267faedd29f3cc6965ade2b899aef28fafe65da131d1efe0001f8e7fa6dc3", 0x1, 0x1f, 0x1, 0x80418, 0x200, 0x8}) syz_open_dev$sndseq(0x0, 0x0, 0x0) setpgid(r2, r2) socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2d, 0x0, 0x0) [ 874.504960] misc userio: The device must be registered before sending interrupts [ 874.530214] misc userio: The device must be registered before sending interrupts 05:55:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000040)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)=0x0) tgkill(r1, r2, 0x35) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)) 05:55:21 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000200)=ANY=[@ANYBLOB="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", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"], 0x0) r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x1ff, 0x4800) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0e85667, &(0x7f00000000c0)={0x40000000, 0x102, "37731de79c7ef471efc2bb0041a3a462aedbfb4983affe54faed8585194e9732", 0x4, 0x0, 0x20000000000, 0x0, 0xb5, 0x6, 0x400, 0x1, [0x4, 0x80000000, 0x4, 0x8]}) 05:55:21 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x4e, 0xfd, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000001ac0)="87459591c30f88e644c088d3b53d1144c12d324892015d456a16dfa2fc93109abeb5e75888d55a3d906ef0c05f1e4573f536d609ca8fd17b0928dfdb00e50dfc7318dac8c0ce39c10c48719fd1d67e0ccabd6397aed770c65ad259a53db124b5295e6000b93816a85716b65ce84b6b6042731916c0be7b0272ff7904f67c91d1fa80d009b491fcd574338bfa2ad0cd061764a185fb803eda23ebe1ce08b3b44679cfce12972a88b9a0a0ce6d40c9307d041f01fa33c9d733c2882ed497f9ee714c26c66398cbcdc971717a91743915cf7dfd0ebc7ff45eca02a5d594", 0xdc, 0x0, &(0x7f0000001bc0)={0xa, 0x4e24, 0x1, @empty, 0x336c}, 0x1c) r0 = syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$TIPC_MCAST_REPLICAST(r0, 0x10f, 0x86) lsetxattr$security_ima(&(0x7f0000000040)='./file0\x00', &(0x7f0000001a80)='security.ima\x00', &(0x7f0000001cc0)=@v2={0x5, 0x1, 0xf, 0x86, 0x1000, "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"}, 0x100a, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x71f6afb8, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000001c00)=ANY=[@ANYBLOB="010000007f0000000300225c23fc364672680000360366b91e7f05c239a1d51dc09eed34d393fd067dd5c5f1ced6dc0d895119fd9064be03e67f67b3de"]) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/null\x00', 0x0, 0x0) recvmmsg(r2, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/47, 0x2f}], 0x1}, 0x2}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, &(0x7f0000000140)=""/162, 0xa2}, 0x5}, {{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000002c0)=""/74, 0x4a}, 0x8}, {{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000001400)=""/158, 0x9e}, {&(0x7f00000014c0)=""/251, 0xfb}, {&(0x7f00000015c0)=""/241, 0xf1}], 0x3, &(0x7f0000000340)=""/72, 0x48}, 0x3}, {{&(0x7f00000016c0)=@sco, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001740)=""/129, 0x81}, {&(0x7f0000001800)=""/156, 0x9c}], 0x2}, 0x4}], 0x5, 0x2102, &(0x7f0000001a40)={0x0, 0x989680}) 05:55:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f00000000c0)={0x4, "2bd05e1fe52076a9cf8c793eca518d643add804a61e7f7b6c3fb32b389cf0ea3", 0x3, 0x1}) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000100)='trusted.overlay.origin\x00', &(0x7f0000000140)='y\x00', 0x2, 0x2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'gretap0\x00', {0x2, 0x4e21, @broadcast}}) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0x1, 0x8}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x301040, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x402, 0x0) pipe2(&(0x7f0000000680)={0xffffffffffffffff}, 0x4000) r3 = syz_open_dev$vbi(&(0x7f00000006c0)='/dev/vbi#\x00', 0x3, 0x2) r4 = creat(&(0x7f0000000700)='./file0\x00', 0x65) r5 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000740)='/proc/capi/capi20ncci\x00', 0x48880, 0x0) pipe2(&(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) r7 = syz_open_dev$swradio(&(0x7f00000007c0)='/dev/swradio#\x00', 0x0, 0x2) r8 = syz_open_dev$adsp(&(0x7f0000000800)='/dev/adsp#\x00', 0x5, 0x228400) r9 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ppp\x00', 0x0, 0x0) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000980)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000940)={&(0x7f0000000880)={0xb4, 0x0, 0xa02, 0x70bd2b, 0x25dfdbfc, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SOCKETS={0x4c, 0x7, [{0x8, 0x1, r1}, {0x8, 0x1, r2}, {0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}]}, 0xb4}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r11 = syz_open_dev$vcsa(0x0, 0x0, 0x0) r12 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r11, 0x84, 0x65, &(0x7f0000000500)=[@in={0x2, 0x4e21, @empty}, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x13}}, @in6={0xa, 0x4e23, 0x4, @mcast1, 0xffffffff}, @in={0x2, 0x4e24, @empty}], 0x4c) open$dir(&(0x7f0000000240)='./file0\x00', 0x0, 0x40) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r11, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x110000}, 0xc, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="687f00005172b8c0bfc01d95879e8265b6c308c25b41abafba88913308ad908a00810287eaedfb2379c5e0248059750dc892b88606fe6ef986ce2325b100d62a47d3913c17ac31f184224be0977085827fd48c8267", @ANYRES16=r12, @ANYBLOB="000325bd7000fddbdf25010000000000000009410000004c00180000000773797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x800}, 0x4000001) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r10, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$VIDIOC_S_FMT(r11, 0xc0d05605, &(0x7f0000000400)={0x7, @win={{0x8, 0x80000001, 0x5}, 0xf, 0x3, &(0x7f0000000200)={{0xffffffffffffcd9c, 0xfffffffffffff000, 0x800, 0x1}, &(0x7f00000001c0)={{0x7, 0xaf, 0x8, 0x5}}}, 0x101, &(0x7f00000002c0)="a9e640f78caddddd7a05ea6a5a006702c9b3665d46ba126922ee584a048c8c0fbb7e1c35a7cad8bc71e015299360b6993922ab6e438da255a081cc6dd039f561adf8b0ed9580eb6dff46aa5b72d9ffc7da71d49b6f49c0915a050f645c3d3f58a500125db697a2501d3fdf0604d79ba31b3ee4e60e499cc3009fdc933965df38d26253cd03bd5bf644651191c567ccfa1cb9aa95b29495ba5466da7a58d38273d8fc4c3f889e40ad424399c04c", 0x7}}) 05:55:21 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'vxcan1\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="420000000000000000000000bac14cbef50c53b07ecf22a56a22979c36fca3f926fc0b6ca89aed1ccc12babb5b1be2f951bc55fdda9489347f216cbbe8ba1ff38feeb26c5cd7c6f2b0f2924e061600bd8ee6701647cf0bf8673fef3f400173214d0306a3f1e9330e556d0b7d7160c7eb49"]}) 05:55:21 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000040)="0018342e9e0e183ac87c6d8a6eff5030b641d832587daf94", 0x0}, 0x18) 05:55:21 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:55:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) r2 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) getpeername$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) mmap$xdp(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x8, 0x13, r2, 0x180000000) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1, 0x8}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = memfd_create(&(0x7f00000002c0)='u\x856\xf9;\x82V\xc0\x00\xc7i\xdc7\xb7;\x9c\x17\x04!\xb5\x98\x83\xf6e\x173\xbb\x00\'\xbe\x00\x00\x00\x00\xaaB\xe0\x06K\x14\x80\x00\x00\x004\xbeg\x19\xe2$\xfa\xa4PY\n\xce\xd0+_\xfd\x114\xbb0*\xc9\x81\x96\x89\x1d\xd4CV\x02H\xd1,9\x18s\xbf\t\xf6\xcb\\-\x8b~\xde7\x89\x10E\x8e\x81\x88\x17S;\xf6\x01e\xcb\xc5k\xb8\xc2\x94J\x1f\xcf\x0e^!\'\x11\x92_xg\r\xd54\xf2\x83\'Q\xdc\xd4\xc6\xff\xabd\xb2wd\xdd\xf4\x83\xe2o($-\x1dn\xe4E,[\xd2dy\x8f\xe2:\xc9\x9d#@\xf2i\xfeQ\x05O', 0x0) write(r1, &(0x7f0000000180)="ec", 0x1) socket$inet_dccp(0x2, 0x6, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x8, {{0x2, 0x0, @multicast2}}}, 0x90) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000000)) 05:55:21 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000080)=0xfffffd73) capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)={0xbc73, 0x6, 0x80000001, 0x8, 0x1, 0x269b}) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x8284) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0xc0505350, &(0x7f00000001c0)={{0xbb8, 0x8000}, {0x6, 0x813}, 0x2, 0x7, 0x1}) 05:55:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{&(0x7f00000000c0), 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, &(0x7f0000007040)) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x208180, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x40) r5 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x52e4, 0x80) r6 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x2, 0x200980) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x10) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x480000, 0x0) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x10000, 0x0) r10 = fcntl$dupfd(r0, 0x406, r1) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f00000003c0)={0x1, 0x8, [{r3, 0x0, 0xfffffffffffff000, 0x10000}, {r4, 0x0, 0xfffffffff0000000, 0x1fffff000}, {r5}, {r6, 0x0, 0xfffffffff0000000, 0x983c5b2fd51548a7}, {r7, 0x0, 0x2000, 0xfffffffff0000000}, {r8, 0x0, 0x1000000, 0x1000}, {r9, 0x0, 0xfffffffffffff000, 0x2000}, {r10, 0x0, 0x10000, 0x100000000c000}]}) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r11, 0x4b6d, 0x0) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000040)) 05:55:21 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) select(0x40, &(0x7f0000000140)={0x6e, 0x261c, 0x1, 0x1, 0x0, 0x1, 0x9, 0xffffffff}, &(0x7f0000000180)={0x24, 0xfffffffffffffffc, 0x4, 0x1, 0x6fc0, 0x0, 0xfffffffffffff800, 0x8}, &(0x7f00000001c0)={0x3, 0x0, 0x3, 0xffffffffffff1ce8, 0xffffffff, 0x8, 0x2, 0x2}, &(0x7f0000000240)={r0, r1/1000+30000}) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x4, 0x40000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r2, 0x4040aea4, &(0x7f0000000080)={0x8001, 0x8001, 0x3, 0x1, 0x2}) ioctl$VIDIOC_DQBUF(r2, 0xc0585611, &(0x7f00000000c0)={0x5, 0xb, 0x4, 0x0, {0x77359400}, {0x1, 0xb, 0x9, 0x2, 0x1, 0x6, "10e04531"}, 0x1f9, 0x5, @offset=0x7fff, 0x4}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x5, 0x80000) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') connect$l2tp(r0, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x1, 0x4, 0x3, 0x1, {0xa, 0x4e22, 0xffff, @local, 0x9}}}, 0x32) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0xa5) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x100, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000180)={0x4, &(0x7f0000000100)="703899247d2d04d4321af179fe0ed3e88b7a2d97eb9f9ecf748ea11276e19904ce99b9fcb38fd430638deccd164cd717678c8194a8647329eb3a494baf47131ac45c01f460"}) accept$alg(0xffffffffffffffff, 0x0, 0x0) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000080)=0x14) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x9) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 5: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x0, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='posix_acl_accessuser!%@%\x00', 0x19) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r0, 0x0, 0x24, &(0x7f00000000c0)='!)securityposix_acl_access]vboxnet1\x00', 0xffffffffffffffff}, 0x30) write$cgroup_pid(r0, &(0x7f0000000140)=r1, 0x12) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x40) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x338d, 0x81, 0x0, 0x1}, 0xffffffffffffff25) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) accept4(r0, &(0x7f0000000040)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c}, &(0x7f00000000c0)=0x80, 0x80000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:21 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000fffffffe) write$P9_RREAD(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYBLOB="f70270a8cc8fff3f4007d94286aaf053866d79702363bee0710b562880525f95b52db0f1912620a4e5d5645f71a4c1f586cec7a71c777200000000000000d7034eccdd3f933108d21b0e71e94c2c2df057d5a041321aef47d08de733bc4a1eafc6efc54106f6b2834a1462f6b62f897d3cacadf44483c8e001d9736d4326db77f403953fd4e52557183c42dd307f56b16430e6131dce23c5cc7891d69145ad"], 0xa2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100), 0x0) accept4(r1, &(0x7f0000000340)=@nfc_llcp, &(0x7f0000000100)=0x80, 0x800) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000640)="2ad4d425e960468d16ca8e57f705264ce0555c7a2da8c13280f72ebdf16dbed4a2e05cb7ee5505c7b5e2f73f5c4037e3eb5c7d", 0x33) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f0000000880)={0x0, 0xffffffffffffffc1, 0x0, 0x101, 0xfffffffffffffffc, 0xfff, 0x5, 0x9, {0x0, @in={{0x2, 0x0, @multicast2}}, 0xace6, 0x8, 0x8, 0x8, 0x7f}}, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, &(0x7f0000000040)=0xf000000, 0x10000000000443) writev(r2, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f00000000c0)=0x5, 0x4) read(r2, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r2, &(0x7f0000000300)={&(0x7f0000000140), 0x10, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) [ 875.419530] QAT: Invalid ioctl [ 875.460822] QAT: Invalid ioctl 05:55:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) getpid() ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) r2 = perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'ifb0\x00', 0x100005100}) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000200)=@assoc_value, &(0x7f0000000240)=0x8) perf_event_open(0x0, 0x0, 0x0, r2, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r0) epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0xfffffffffffffdb4) modify_ldt$read(0x0, &(0x7f0000000300)=""/156, 0x9c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x8}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000000c0)={r5, 0x4, 0x30, 0x40, 0x6}, &(0x7f0000000100)=0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000140), 0x0}, 0xfffffffffffffdac) openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) 05:55:22 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = request_key(&(0x7f0000000040)='encrypted\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)='proc@^cpuset\x00', 0xfffffffffffffffa) r1 = request_key(&(0x7f0000000100)='.dead\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='user\x00', 0xfffffffffffffffe) r2 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f00000002c0)="a2c2d3d82319a9ad43dbea84a9abf865e0786c0adbdde621db653a018a4dfeba971c0e52cae4e87d5135e7a4a33f16ea61f65bb04790fd61b40d90d581ffa8bcf2873d5e1610d7751abd9c00bb366e1a324c4945dd9267cd563192c4521007cac228b946d76731d3282e8418d3bb0e50fe799564f69e463edb3f5cbb2c6efb6e29ac28cc83fd236406bb4b2edd722435c31cc63a90393207e2d6d5fe0a3bb145b10beb522a1737120dacc41352cf45ee83fd943b29795bb23fd087089dfb6c37a11eb012c160", 0xc6, 0xfffffffffffffffc) keyctl$dh_compute(0x17, &(0x7f0000000240)={r0, r1, r2}, &(0x7f0000000400)=""/107, 0x6b, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:55:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000001100)=[{{&(0x7f00000000c0), 0x80, &(0x7f00000004c0), 0x0, &(0x7f0000000540)=""/79, 0x4f}}], 0x1, 0x0, &(0x7f0000007040)) socket$inet6_sctp(0xa, 0x1, 0x84) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000140)={{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @remote}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x2]}, 0x5c) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x208180, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ppp\x00', 0x0, 0x0) r4 = creat(&(0x7f0000000240)='./file0\x00', 0x40) r5 = syz_open_dev$usbmon(&(0x7f0000000280)='/dev/usbmon#\x00', 0x52e4, 0x80) r6 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x2, 0x200980) r7 = creat(&(0x7f0000000300)='./file0\x00', 0x10) r8 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vcs\x00', 0x480000, 0x0) r9 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000380)='/dev/rtc0\x00', 0x10000, 0x0) r10 = fcntl$dupfd(r0, 0x406, r1) ioctl$UDMABUF_CREATE_LIST(r2, 0x40087543, &(0x7f00000003c0)={0x1, 0x8, [{r3, 0x0, 0xfffffffffffff000, 0x10000}, {r4, 0x0, 0xfffffffff0000000, 0x1fffff000}, {r5}, {r6, 0x0, 0xfffffffff0000000, 0x983c5b2fd51548a7}, {r7, 0x0, 0x2000, 0xfffffffff0000000}, {r8, 0x0, 0x1000000, 0x1000}, {r9, 0x0, 0xfffffffffffff000, 0x2000}, {r10, 0x0, 0x10000, 0x100000000c000}]}) r11 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_FONTRESET(r11, 0x4b6d, 0x0) ioctl$TIOCSETD(r11, 0x5423, &(0x7f0000000040)) 05:55:22 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$KVM_SET_CPUID2(r1, 0x4008ae90, &(0x7f0000000040)={0x2, 0x0, [{0x80000007, 0x4, 0x1, 0x2, 0x1, 0x7, 0x20}, {0xc0000000, 0x5, 0x4, 0x2, 0x4f, 0x1800, 0x9}]}) 05:55:22 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000100)={0x9d0000, 0xfff, 0xa25d, [], &(0x7f00000000c0)={0xbf0b6f, 0x100, [], @string=&(0x7f0000000080)=0x100000000}}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0xa6a, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0x13, 0x6, 0x2, 0x12000000, 0x0, r1, 0x8}, 0x2c) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000140)) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000180)=@int=0x2, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:22 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, r0, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:22 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x2000) timerfd_settime(r0, 0x1, &(0x7f0000000080)={{}, {0x0, 0x989680}}, &(0x7f00000000c0)) r1 = socket$inet(0x2, 0x0, 0x100000001) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000180)=@broute={'broute\x00', 0x20, 0x1, 0x240, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000280], 0x0, &(0x7f0000000240), &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}, 0x2b8) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000000)={@local, @empty, 0x1, 0x9, [@empty, @remote, @remote, @empty, @empty, @multicast1, @multicast1, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}]}, 0x34) 05:55:22 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000040), 0x0}, 0x18) 05:55:22 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() prlimit64(r0, 0x6, &(0x7f0000000140)={0x8, 0x4}, &(0x7f0000000180)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x4480, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r2, 0xc0905664, &(0x7f0000000080)={0x0, 0x0, [], @bt={0x81, 0x8, 0x3, 0x1, 0xe1, 0x3, 0x1, 0x2}}) socket$tipc(0x1e, 0x2, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:22 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x4, 0x89, "ef135bd3e15a52b24b02e4f35076e4814745569aeb8f743d689afd8fabb9f1385e4a26aef91d0370cf0db8bf02cd68d8e34a666ba6f2c107d992e8c3795c1ea9c80be39836954b03e1d437b5bdc5369289b1414409c8cd523b3de8ee9b28f0e994e02b8382eada56c42e43a7f9d9fc7f2939dd13e0824078770df65ca079839a65e62dd8c11ccb721e"}) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:22 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x3389, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:22 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000000c0)=0x12, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000002c0)={{0x2, 0x0, @multicast2}, {0x1, @broadcast}, 0xa, {0x2, 0x0, @initdev}, 'tunl0\x00'}) 05:55:23 executing program 0: r0 = inotify_init() r1 = dup(0xffffffffffffffff) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x21, &(0x7f0000e62000)={@broadcast, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast2}, 0xc) lstat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000380)) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000180)='/dev/nullb0\x00', 0x4000000004002, 0x0) inotify_init() getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000240)={0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x20) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f0000000000)={0x0, 0x1, 0x5, 0x305}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000002c0)={r6, 0x157, 0x3, 0xffffffff, 0xfffffffffffffc01, 0x6}, 0x14) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r0, 0x84, 0x17, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) r7 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0x0, 0x0) preadv(r7, &(0x7f0000000040)=[{&(0x7f0000000400)=""/4096, 0x2d000}], 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000200)='gretap0\x00', 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r3, 0xc0a85322, &(0x7f0000000080)) 05:55:23 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000080)={0x401, 0x0, 0x4, 0x10800, {0x77359400}, {0x5, 0x0, 0x7, 0x0, 0x2, 0xfffffffffffffffb, ',${#'}, 0x8, 0x4, @offset=0x6, 0x4}) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r0, 0x40405514, &(0x7f0000000040)={0x7, 0x5, 0x100000000, 0x3}) 05:55:23 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x7, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 05:55:23 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_G_CTRL(r0, 0xc008561b, &(0x7f0000000100)={0x80, 0x7ff}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x103, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000000)) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/cache_bypass\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='net/protocols\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r2, &(0x7f00000017c0), 0x1fe, 0x400000000000) 05:55:23 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0x6, 0xffffffff, [], &(0x7f0000000080)=0x200}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$NBD_DO_IT(r1, 0xab03) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'veth1_to_hsr\x00', {0x2, 0x4e23, @empty}}) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:23 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) r2 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x1, 0x101000) write$UHID_GET_REPORT_REPLY(r2, &(0x7f0000000180)={0xa, 0x1, 0x4, 0x1}, 0xa) accept4$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000100)=0x1c, 0x80800) 05:55:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000040)={0x4, 0x3ff800000000, [{0x3, 0x0, 0x200}, {0x9, 0x0, 0xffff}, {0x73, 0x0, 0x28d0}, {0x4, 0x0, 0xa0e8}]}) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:23 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="2e00000096cdd98f1f02f56d88886afd40bc3550a327ea37291093a8c06d7ea8e722d5d60e37bff2794475cb178a191ee5cf"], &(0x7f0000000080)=0x36) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000140)={r3, 0x4c, &(0x7f00000000c0)=[@in6={0xa, 0x4e23, 0x10, @mcast1, 0x9c8}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}]}, &(0x7f0000000180)=0x10) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0x9, 0x900000000000000, 0x3, 0x6, 0x0, 0x7ff, 0x20, 0x2, 0x80, 0xffffffff, 0x4, 0x1, 0x7ff, 0x3, 0x0, 0x100, 0x200, 0x21, 0x0, 0x26dd, 0x37cc000000, 0x0, 0x1f, 0x37, 0x3, 0x0, 0x2, 0x2, 0x4, 0x0, 0x0, 0x9, 0xffffffffffffd6c9, 0x80, 0x2, 0x7, 0x0, 0xeeb, 0x0, @perf_config_ext={0xfff, 0x8}, 0x20200, 0x3, 0xc3, 0x5, 0x6, 0x9, 0x400}, r4, 0xffffffffffffffff, r0, 0xa) 05:55:23 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x7c000000, &(0x7f0000ffb000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) r3 = shmget(0x0, 0x1000, 0x4, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x200001, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) r5 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000300)) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000200)={'lo\x00'}) getsockname(r5, &(0x7f00000004c0)=@ipx, &(0x7f0000000380)=0x80) accept$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000980)={'vcan0\x00', r7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000002000)={@local, 0x7e, r8}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r6, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r9 = dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r6, 0x80081272, &(0x7f00000003c0)) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r10, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) r11 = semget$private(0x0, 0x7, 0x400) semtimedop(r11, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r11, &(0x7f0000000040)=[{0x0, 0x7fffffff}, {}], 0x2) semctl$SETALL(r11, 0x0, 0x11, &(0x7f0000000080)=[0x1]) ioctl$KVM_SET_SIGNAL_MASK(r9, 0x4004ae8b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]) accept4$unix(r10, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) 05:55:23 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x100, 0x0, 0x1}, 0x1b) r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x8, 0x480000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x500, 0x70bd2c, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x8010) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:23 executing program 3: clone(0xc00ffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='personality\x00') ppoll(0x0, 0x0, 0x0, 0x0, 0x32c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) times(&(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendfile(r0, r0, 0x0, 0x3) fcntl$notify(r1, 0x402, 0x1) 05:55:23 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={0x0, 0x6e}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000001c0)={r3, 0x7fffffff}, &(0x7f0000000200)=0x8) r4 = getpid() perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x4fd, 0x41a, 0x2, 0x0, 0x0, 0x3, 0x80, 0x4, 0x5, 0x37, 0xfffffffffffffb2b, 0x0, 0x2, 0x7, 0x66e, 0x40, 0x7f, 0x0, 0x3, 0x8000, 0x136d, 0x5, 0x5, 0x920, 0x0, 0x3f, 0x9, 0x3, 0x2, 0x5, 0x1, 0x400, 0xfffffffffffffff8, 0x7, 0x1, 0x2, 0x0, 0x569147f1, 0x7, @perf_config_ext={0xa8c0, 0x7}, 0xc008, 0x4, 0x100000000, 0x4, 0xe1f, 0xb957, 0x8}, r4, 0xb, r1, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x8}, 0x10) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000300)={0x0, 0x8000, 0x9, &(0x7f00000002c0)=0x9}) epoll_create(0xffffeffffffffffd) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r5, &(0x7f0000000140)="2382e20cd71b824983548998de252555d17e37799528318848f260e0c1d33d91927c0a450a9d4a504e3658c5f47f1436153448b0231eb4147047ab6b12acbe5411445cb6402a5cfa3d99c867afecf760c1571b53", 0x0}, 0x18) dup(r0) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') 05:55:24 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x400840, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x44001, 0x0) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xff, 0x80) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 877.502095] ptrace attach of "/root/syz-executor3"[6187] was attempted by "/root/syz-executor3"[6198] 05:55:24 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:24 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x20040, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000140)={0x2c2fc0000000000}, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0xff, 0x3, 0xffffffffffffffff, r0}, 0x275) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000080)={'security\x00'}, &(0x7f0000000100)=0x54) 05:55:24 executing program 5: lgetxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000300)=@random={'trusted.', '/dev/ppp\x00'}, &(0x7f00000004c0)=""/4096, 0xddc64f4839f9112c) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) vmsplice(r1, &(0x7f0000000200)=[{&(0x7f0000000040)="0de499f16a4c4b6a7316c58c4c71e665d20122a73468b79430eb8d516f2cd29cb599078cba5f0ee8db63fc2cb1dbc1d61ca840ae9699dd7011ec5ee27b5f1a65c6da420a59e2ce0aac7e47a9108d10dc0ad82b307afad9ead9bf1c2d72753ba7cb398c1a6b7634d82b93903d2afcdb9818a9d8efcc266715f5d2fb26ec6c15e2375ddf961bb41939c0bef6255d58755e9713910632125d8e58eb08205aee90bea01ad00b59aa681dc645695fd58634fbe3e6b2368c3d740a024becd79b93900fe75256c789fb74", 0xc7}, {&(0x7f0000000140)="71ff628929086e71b2944738c4d83ec1692c0e209e9e1a1430c27082bb9e1c6d200f76bc5110721e55cc3f706a99c799d2ad6132c134ab8d3f4cb7f80d02763df24a7f8f537b70b85ac56e15959f8a15866754612ab91917cfd3682bc235e5f26f2b90ab3b3df465992c45595f5de173b1912a33deebef4dfb1379665bc5eceafde914ec74d5d61f8d95798736bd73c750eb4b3657abe7eea6e523aea19f2512a233b1baeba4955713efa6c3932d", 0xae}], 0x2, 0x5) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:24 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) ioctl$KDSKBMODE(r2, 0x4b45, &(0x7f0000000080)=0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:24 executing program 1: r0 = syz_open_dev$sndpcmc(&(0x7f0000000100)='/dev/snd/pcmC#D#c\x00', 0x3, 0x0) recvmmsg(r0, 0x0, 0x1c2, 0x400, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x13, 0x4, 0x338d, 0x2, 0xffffffffffffffff, r0, 0x2}, 0x1d) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000140)={r1, &(0x7f0000000180)='#', 0x0}, 0xffffffffffffff84) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm-control\x00', 0x40, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000800)=0x1, 0x4) syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r2, 0xc05c5340, &(0x7f0000000040)={0xff, 0x80, 0x8, {}, 0xffffffffffff0000, 0x6}) r3 = dup3(r1, r2, 0x80000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x3, @remote, 0x4}}}, &(0x7f0000000000)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f00000002c0)={0x1fa7, 0x0, 0x5, 0x6, r4}, 0x10) 05:55:24 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) fcntl$lock(r2, 0x25, &(0x7f00000000c0)={0x0, 0x3, 0x1, 0x5, r1}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0xfffffffffffffe9d) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000040)={0x9, 0x1, 0x10001, 0x2, 0x1}) r5 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)="125f8457a13e9de3cd4fb5ac6f9185ecdeec88800bb2d793c9c4205019f7546df1db3791a3f9e815960f0afd84cdd6b2ff4f72d8da943aedc27b1bbc748e915b0bfe16944eeda28c409a5654ed1ef7952f4f694862756766c9bfda5b2fdc6787bd161767", 0x64, 0xfffffffffffffffb) r6 = add_key(&(0x7f00000002c0)='big_key\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f00000004c0)="f4f10bc5a721e911571f19417beb360f1e9649191291162fb5d39d0f240c7ac02bcd1415a453523bbf18923cebfcd2789f9d84c6a6ddf0e89f439d6cb9e8a9da32e065073e87c7a274ec883dee56e0bc117dff32b2d4b5a33bb3dba6311a156c14301eb4ee189330079611d3ad8fe874bbb9253913357f0d77647bbf5b9fa8fe86ebb5417cdcfe06101028c4fadef4bd9bc14b06d7c92927ae138ee342171611ca746f59adeb0d301fe63c03f53d81de500c67c2867e8f1e45c8714b1dc1", 0xbe, 0xfffffffffffffffa) keyctl$instantiate(0xc, r5, &(0x7f0000000240)=@encrypted_update={'update ', 'default', 0x20, 'user:', '/dev/ppp\x00'}, 0x1e, r6) modify_ldt$write2(0x11, &(0x7f0000000100)={0x100000001, 0x20000000, 0x2000, 0x4, 0xffffffff, 0xbfd, 0x1, 0xc238, 0x800, 0x9}, 0x10) 05:55:24 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) openat$ion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ion\x00', 0x81, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 878.238326] ptrace attach of "/root/syz-executor3"[6231] was attempted by "/root/syz-executor3"[6199] 05:55:25 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) sendto$rxrpc(r0, &(0x7f0000000040)="042e84dead4b075dda3e73e047a991a8a9c7e650b952e4a3e9f3360dadc8a43629a35c0ee45d9244394cfdec69eaf8a3d73b40", 0x33, 0x4000, &(0x7f0000000080)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x24) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:25 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x1, 0x2) ioctl$CAPI_INSTALLED(r0, 0x80024322) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r1, &(0x7f00000000c0)="ed20883065e35cecd4476971cca4354aa70c701c524e76ee67ed17a8bf80fad912186c", 0x0}, 0x18) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000080)=0x1b) 05:55:25 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000100)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000200)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(r0, &(0x7f0000000440)={0x9e, 0x7d, 0x1, {{0x0, 0x78, 0xfffffffffffff801, 0x20, {0x88, 0x3, 0x1}, 0x800000, 0x101, 0x7ff, 0x81, 0x11, '/dev/vga_arbiter\x00', 0x11, '/dev/vga_arbiter\x00', 0x11, '/dev/vga_arbiter\x00', 0x12, '/dev/snd/pcmC#D#p\x00'}, 0x11, '/dev/vga_arbiter\x00', r1, r2, r3}}, 0x9e) r4 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3ff00000000000, 0x200) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0x227) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r6 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000040)={0x5, 0x9, 0x4, 0x5, 0x800000000000000}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r6, &(0x7f00000000c0), 0x0}, 0xfffffe74) 05:55:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0a5c1f023c126285719070") sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1c}}, 0x0) r1 = socket(0x10, 0x80002, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x80000001, 0x0, 0x4, 0x0, 0x6}, &(0x7f0000000300)=0x14) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000740)=@assoc_value={r2, 0x6}, &(0x7f0000000780)=0xfffffffffffffe5e) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="4febcae4599671054c"}, {&(0x7f0000000180)="7d2803b22bcc9caa65a1438b1710c6c151ba7ca01b33a9263265933f423fde986c0b1ba92223b7ed763ec8dc842dab54ce0ec40c1b492e3b19e4d3fdbdd1f67c21b00f56574991da799a2a7951c59c306d5379c66c41d0360c547d54ab818f1e73fb97380bd8abb07e91d5bc609055e8d38da211c21324f299195a412be3896ba7b0c3a052f657674b28b59fb7ef02eab500c078fecbd09e"}, {&(0x7f0000000240)="5f015c37a35a4bf68ab87b74b97858c20ba65e9ae3699ccc0b88ff98dc7c788ba4b06e9f208b02372bef0fc5f844d3170eff7bb2a3bec9ae27d7fdf4b83f465882933e78f90b7e9ce9c6cb1696c6e8ce189f9c2172a0fcd2c4a569fe8fa3045e9f3defde99272670429c01ff923dc6f3de10349ff30d2a6a7ea32743624e0d6b32a8e926ba"}, {&(0x7f0000000380)="876e8afae236205ea7b32ceaf82529da8691797e71f3222e607a9a1e162136b31479c7987d9fc25f28cf95b4243e20c114262bb81fb526363c32b1b5667f8d83943965188281707f501d604ba7f7c66a23a2797fc7d4f0f36acb7e62c0b2b8ace0d455931aa9cac4707c4cea5682ac4cb63552db675e45590e81ffa23770ec7d4edcd8005d29fb7975a119ba327d04705e1f212bfa96cd7863214d30b4642d5bd88d88af7f28683663b0aab588f8e206ca293b03937675", 0xfffffffffffffdaa}], 0x0, &(0x7f0000000100)}], 0xba363894e7c921, 0x0) 05:55:25 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x7c000000, &(0x7f0000ffb000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) r3 = shmget(0x0, 0x1000, 0x4, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x200001, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) r5 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000300)) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000200)={'lo\x00'}) getsockname(r5, &(0x7f00000004c0)=@ipx, &(0x7f0000000380)=0x80) accept$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000980)={'vcan0\x00', r7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000002000)={@local, 0x7e, r8}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r6, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r9 = dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r6, 0x80081272, &(0x7f00000003c0)) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r10, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) r11 = semget$private(0x0, 0x7, 0x400) semtimedop(r11, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r11, &(0x7f0000000040)=[{0x0, 0x7fffffff}, {}], 0x2) semctl$SETALL(r11, 0x0, 0x11, &(0x7f0000000080)=[0x1]) ioctl$KVM_SET_SIGNAL_MASK(r9, 0x4004ae8b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]) accept4$unix(r10, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) 05:55:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:25 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000000)=""/48, 0x7ffff000}], 0x1}}], 0x1, 0x0, 0x0) 05:55:25 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x338d, 0x3, 0x0, 0xffffffffffffff9c}, 0x2c) r1 = dup3(r0, r0, 0x0) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000040)={0x20f2f3f1}, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:25 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000100)={0x0, 0x0, 0x3, 0x0, [], [{0x81, 0x1ff, 0x2, 0x4, 0x8}, {0x3, 0x6, 0x800, 0x3, 0x17, 0x100000000}], [[], [], []]}) setsockopt$RDS_GET_MR(r0, 0x114, 0x2, &(0x7f00000000c0)={{&(0x7f0000000040)=""/47, 0x2f}, &(0x7f0000000080), 0x8}, 0x20) socket$can_bcm(0x1d, 0x2, 0x2) 05:55:25 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x20002, 0x20) setns(r0, 0x24000000) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x5, 0x0, 0x1, 0x1}, 0x2c) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x20000, 0x0) ioctl$UI_DEV_DESTROY(r1, 0x5502) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000000c0)=@sack_info={0x0, 0x206, 0x1ff}, &(0x7f0000000100)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r3, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r2, 0xfffffffffffffffd, 0x0}, 0x18) prctl$PR_CAPBSET_READ(0x17, 0x25) 05:55:25 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000040)={0x7fff}, &(0x7f0000000080), &(0x7f0000000100)={0x0, 0x989680}, 0x8) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x3, 0x100) recvmmsg(r1, &(0x7f0000000940)=[{{&(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000200)=""/1, 0x1}, {&(0x7f0000000240)=""/38, 0x26}, {&(0x7f00000002c0)=""/18, 0x12}, {&(0x7f0000000300)=""/129, 0x81}, {&(0x7f0000000400)=""/198, 0xc6}, {&(0x7f0000000500)=""/89, 0x59}, {&(0x7f0000000580)=""/45, 0x2d}], 0x7}}, {{&(0x7f0000000640)=@caif=@dgm, 0x80, &(0x7f0000000840)=[{&(0x7f00000006c0)=""/169, 0xa9}, {&(0x7f0000000780)=""/134, 0x86}], 0x2, &(0x7f0000000880)=""/139, 0x8b}, 0x8}], 0x2, 0x2000, &(0x7f00000009c0)={0x0, 0x1c9c380}) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000a00)={0x9, 0x0, 0x6, 0x9}, 0x10) 05:55:25 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x1, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:25 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) accept4$alg(r0, 0x0, 0x0, 0x800) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:25 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) process_vm_writev(r1, &(0x7f0000000500)=[{&(0x7f0000000080)=""/182, 0xb6}, {&(0x7f0000000140)=""/108, 0x6c}, {&(0x7f00000001c0)=""/191, 0xbf}, {&(0x7f00000002c0)=""/197, 0xc5}, {&(0x7f0000000400)=""/126, 0x7e}, {&(0x7f00000004c0)=""/15, 0xf}], 0x6, &(0x7f0000000840)=[{&(0x7f0000000580)=""/186, 0xba}, {&(0x7f0000000640)=""/208, 0xd0}, {&(0x7f0000000740)=""/200, 0xc8}], 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)="b1", 0x0}, 0x18) 05:55:25 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000000500)='/dev/null\x00', 0x381001, 0x0) syz_open_dev$usb(&(0x7f0000000540)='/dev/bus/usb/00#/00#\x00', 0xcc, 0x121000) r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0xffffffffffffff75) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000100)={0x0, 0x0}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f00000002c0)) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x2082c1, 0x0) ioctl$SG_EMULATED_HOST(r3, 0x2203, &(0x7f0000000080)) epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$FIBMAP(r3, 0x1, &(0x7f0000000140)=0x5) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:25 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000000c0)={0x0, 0xa05, 0x2, [], &(0x7f0000000080)=0x1}) [ 879.158750] *** Guest State *** [ 879.201252] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 879.214954] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 879.246308] CR3 = 0x0000000000000000 [ 879.254971] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 879.276865] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 879.295414] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 879.314125] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 879.337348] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:55:26 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x7c000000, &(0x7f0000ffb000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) r3 = shmget(0x0, 0x1000, 0x4, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x200001, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) r5 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000300)) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000200)={'lo\x00'}) getsockname(r5, &(0x7f00000004c0)=@ipx, &(0x7f0000000380)=0x80) accept$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000980)={'vcan0\x00', r7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000002000)={@local, 0x7e, r8}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r6, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r9 = dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r6, 0x80081272, &(0x7f00000003c0)) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r10, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) r11 = semget$private(0x0, 0x7, 0x400) semtimedop(r11, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r11, &(0x7f0000000040)=[{0x0, 0x7fffffff}, {}], 0x2) semctl$SETALL(r11, 0x0, 0x11, &(0x7f0000000080)=[0x1]) ioctl$KVM_SET_SIGNAL_MASK(r9, 0x4004ae8b, &(0x7f00000009c0)=ANY=[@ANYBLOB="0800007d281dfd9dee27cd0dff6eeaaf102ca035664cc53435a74adbd22e6413107d17204e62c2911f5ea8efc5699326e02b66b9523b85c5bbc7330062a31704008f5efba52ee00351efb3336b5c0a1b111a2aea05000000437eda4900013e63d23a89cdbc1a7e34d12656699601a7e0368e2b66f2b7db5ca0f7a0a37501000034f4e6880693ee3686d00c0000006250b91a7b312dd0efd662c65b978cfd7d6a1ba7f38400000000000067ae735b1460732bd145277ca7d36dceea02cc882ae34b6f47e36cf5bb7325babc51d92f7906ca7e4f526c0ac1b706a53dcb1b0ff57cbbc2856af788056980a57068fe452d0364c78bd53fa3a7bb3e6135efe8156fed0a239d8abdb49ab2fbfe84b96747f45d3f1d2d6ece819afdf8447c196de6148042363c7536eb58579c0000ae52476364df95bed491a48d66c4ffad0cd44138d4406dc73d4db9384cc0c8df6f0104000000000000000000000000000000aa0c5c098045a987649f2a3a5e413a87c41bf92b9a95c3bf3495fc7e312923dd0dac5672a23c84f92abe67b987b7a52e1d9a742edbb200000000000000000000000000000000f6db93be90ee6ca6520924a137c019064415ccfe6be5fd66e5edd78dbb9c225de2bcbb6f1805b624e1e70f9a6222cdf660a823a6ce24a3f830edf72bb2b0d0e2c56e5c4c7f2fd25473c7a439ac6db8e954d37253697f2f847a24f6979473f9b9b394ac7239b6e821b448f24832384c66b0527f80510f0d89555fc331b09cc6682168e0e82261a24d931aeea0393b52e9cada78acf7857057cb6ad30699f250d3fba6ca9a6304a8dde20869cb2917f5b1df4a1240748a5cf01a08d54fcd97bb5433620562f2c07f73d0373078f9e5be6f5a30a94ee70415fc61558370d2e9b568bd7c7768f14cc9f0b14556984d2e7a2430e72fb456f705144b8fa7aa8e83519e9a524fb5ed52a536568447a55ff3d4ede5b3b7dfae467bf09b83706972ccb1cc097e099a173d0dab0575541db434a63fbb72bf04a2cc8b0b678a22f0f9824af47a3cac8038d97f9b6e573e1d378ea53880df9f29c6747c3bffd7fef7ab64876905633aabf7a4eff46cdaec414c60b538081cff162e8a491ae66448d9928adcbf78663b910051e02c3060a0c011629c562da2983b9d40a82dbb5d28a0a26d5730793ee138ee4501bb1452d6d6dfc1567ddcece239e7c993cc256d10726145a91ef59b8502e56a3c9c5dd192d08a765a28a2773d80b0978f5a1cd1fc5149d41cd419dc25e26be18587863165bff0528ccd0681c841ffe86036c71607345926581cc14c43fcfa3cf5f55724061d6f2c5f509568d6cfca4c55d43a239cec2337bfe732d409df0a8f3e077bc283ee0417a03d4831c2017e727708afde4218ed120064c9945be8679e8b2005967844af22bb05fc1e1f9123fabecd1fe1096f02df43df7c4b9331fb3958aaa3568c55db1f43ae8472707f4c0189e1cbf127e0e2cc7009f490c96c116ddfe95957c52f064dc36b9cedc14a037a4958a525bc254c9507e49bdc9b5d68d4d3a577df4caec4a2ceed73378c7a055906970fc743f21bcdd8385223a6a05fabb60c42a21483f9334fd1827ea68fc76b402bbf8bf66b93632f50657e72905dbc78006820f3d850879083f8db786674a25458a2b79dd3a175e228f0c0b049f8c7a12cb361142969815ed43e101db567fae7366bf3fa43ba839f0b59e2e5979726b33a22b192210ba1ceb981824ce29fb669b9912aec0d"]) accept4$unix(r10, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) [ 879.390138] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 879.414789] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 879.422950] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 879.448974] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 879.458152] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 879.469493] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 879.479077] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 879.487818] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 879.497999] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 879.505197] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 879.513007] Interruptibility = 00000000 ActivityState = 00000000 [ 879.520271] *** Host State *** [ 879.525582] RIP = 0xffffffff811f97e0 RSP = 0xffff88802a13f670 [ 879.532053] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 879.544854] FSBase=00007f1fee1d9700 GSBase=ffff8880ae700000 TRBase=fffffe0000033000 [ 879.559390] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 879.575132] CR0=0000000080050033 CR3=00000000a5c78000 CR4=00000000001426e0 [ 879.584446] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 879.602533] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 879.610323] *** Control State *** [ 879.614845] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 879.622301] EntryControls=0000d1ff ExitControls=002fefff [ 879.628947] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 879.636648] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 879.643570] VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 [ 879.650890] reason=80000021 qualification=0000000000000000 [ 879.658942] IDTVectoring: info=00000000 errcode=00000000 [ 879.665411] TSC Offset = 0xfffffe26ef8faec8 [ 879.670174] EPT pointer = 0x000000009690a01e [ 879.814839] net_ratelimit: 20 callbacks suppressed [ 879.814891] protocol 88fb is buggy, dev hsr_slave_0 [ 879.826037] protocol 88fb is buggy, dev hsr_slave_1 05:55:26 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x2, 0x2000) ioctl$KVM_DEASSIGN_PCI_DEVICE(r1, 0x4040ae72, &(0x7f0000000080)={0x32815c78, 0x800, 0x80000001, 0x2, 0x1}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x7b) 05:55:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:26 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = shmget$private(0x0, 0x4000, 0x420, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_UNLOCK(r1, 0xc) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:26 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:26 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000040)) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:26 executing program 1: syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x10000, 0x0) perf_event_open(&(0x7f0000000080)={0x7, 0x70, 0x20, 0x100000001, 0x9, 0x5, 0x0, 0xfffffffffffffff7, 0x1000, 0x0, 0x6, 0x80000001, 0xfffffffffffffff7, 0x8000, 0x7f, 0x7fffffff, 0x5, 0x4, 0x3f, 0xffff, 0xa1, 0x80000000, 0x8001, 0x8, 0x0, 0x4, 0x7ff, 0xfffffffffffff85e, 0x4, 0x9, 0x3, 0xe30, 0x100000001, 0x3f, 0x1, 0x1ff, 0x80000001, 0x4, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000040), 0x5}, 0x8, 0x7, 0x13ef, 0x3, 0x2, 0x9, 0x8}, 0x0, 0x4, r1, 0x8) ioctl$TCXONC(r1, 0x540a, 0xfff) 05:55:26 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:26 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x5) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x40000) [ 880.054013] protocol 88fb is buggy, dev hsr_slave_0 [ 880.059218] protocol 88fb is buggy, dev hsr_slave_1 05:55:26 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000380)='/dev/audio#\x00', 0xa2, 0x0) prctl$PR_GET_KEEPCAPS(0x7) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x6}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000100)={r1, @in={{0x2, 0x4e20, @multicast1}}, 0x101, 0x1, 0xfd1, 0xfffffffffffffff7, 0x48}, 0x98) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000040)="12", 0x0}, 0x18) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) getsockname$inet(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x10) 05:55:26 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept4(0xffffffffffffff9c, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80, 0x80000) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400100, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x159900) accept$alg(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:26 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x7fff, 0x338c, 0x2, 0x0, 0x1, 0x7}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000000c0)="321c", 0x0}, 0x235) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x140, 0x0) [ 880.294042] protocol 88fb is buggy, dev hsr_slave_0 [ 880.299239] protocol 88fb is buggy, dev hsr_slave_1 [ 880.304418] protocol 88fb is buggy, dev hsr_slave_0 [ 880.309504] protocol 88fb is buggy, dev hsr_slave_1 [ 880.314660] protocol 88fb is buggy, dev hsr_slave_0 [ 880.319728] protocol 88fb is buggy, dev hsr_slave_1 05:55:27 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz0\x00', 0x200002, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x1, 0x2000, 0x7c000000, &(0x7f0000ffb000/0x2000)=nil) shmget$private(0x0, 0x3000, 0x200, &(0x7f0000ffb000/0x3000)=nil) r3 = shmget(0x0, 0x1000, 0x4, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_STAT(r3, 0x2, &(0x7f0000000080)=""/19) openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x200001, 0x0) r4 = socket$inet(0x2, 0x3, 0x2) r5 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x3ff, 0x1) ioctl$SCSI_IOCTL_GET_PCI(r5, 0x5387, &(0x7f0000000300)) r6 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) ioctl$SIOCSIFMTU(r6, 0x8922, &(0x7f0000000200)={'lo\x00'}) getsockname(r5, &(0x7f00000004c0)=@ipx, &(0x7f0000000380)=0x80) accept$packet(0xffffffffffffff9c, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000440)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000480)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f0000000980)={'vcan0\x00', r7}) ioctl$sock_inet6_SIOCSIFDSTADDR(r6, 0x8918, &(0x7f0000002000)={@local, 0x7e, r8}) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r6, 0x28, 0x0, &(0x7f0000000100)=0x1, 0x8) setsockopt$inet_int(r4, 0x0, 0xca, &(0x7f0000000000)=0x10001, 0x10) r9 = dup2(r2, r1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x3e7, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BLKGETSIZE64(r6, 0x80081272, &(0x7f00000003c0)) r10 = syz_open_procfs(0x0, &(0x7f00000001c0)='clear_refs\x00') openat$vnet(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhost-net\x00', 0x2, 0x0) pwritev(r10, &(0x7f0000000180)=[{&(0x7f0000000080)='4', 0x1}], 0x1, 0x0) fcntl$dupfd(r6, 0x0, r6) r11 = semget$private(0x0, 0x7, 0x400) semtimedop(r11, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9}], 0x1, &(0x7f0000efe000)={0x2000}) semop(r11, &(0x7f0000000040)=[{0x0, 0x7fffffff}, {}], 0x2) semctl$SETALL(r11, 0x0, 0x11, &(0x7f0000000080)=[0x1]) ioctl$KVM_SET_SIGNAL_MASK(r9, 0x4004ae8b, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"]) accept4$unix(r10, &(0x7f0000000000), &(0x7f00000000c0)=0x6e, 0x800) 05:55:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) setsockopt$packet_int(r0, 0x107, 0x12, &(0x7f0000000040)=0x6, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:27 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) 05:55:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:27 executing program 4: prctl$PR_CAPBSET_DROP(0x18, 0xd) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:27 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x100, 0x0) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000080)) 05:55:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000040)=""/251) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000400)={0x3, 0x0, &(0x7f0000000180)=""/225, &(0x7f00000002c0)=""/236, &(0x7f00000004c0)=""/207, 0xf000}) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000140)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:27 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:27 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='\a', 0x0}, 0xfffffffffffffe9a) 05:55:27 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0xfffffffffffffca3, 0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1f, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:28 executing program 4: r0 = syz_open_dev$audion(&(0x7f0000001440)='/dev/audio#\x00', 0x5, 0x2001) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000001480)={0x0, 'ip6tnl0\x00', 0x3}, 0x18) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x81, 0x125200) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000080)={0x89, @dev={0xac, 0x14, 0x14, 0x1e}, 0x4e20, 0x3, 'sh\x00', 0x1, 0x2, 0xc}, 0x2c) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="4232b4edc094"}) connect$pppoe(r0, &(0x7f0000000100)={0x18, 0x0, {0x3, @broadcast, 'ip6erspan0\x00'}}, 0x1e) accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f00000000c0)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$unix(r1, &(0x7f0000000200)=@abs={0x1, 0x0, 0x4e24}, 0x6e) epoll_create(0x0) syz_open_dev$vcsa(0x0, 0x0, 0x410000) connect$vsock_dgram(r1, &(0x7f00000001c0)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 05:55:28 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) 05:55:28 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x800000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_create(0x8000) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000780)={@loopback, 0x0}, &(0x7f00000007c0)=0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000800)={@loopback, r3}, 0x14) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x1, @mcast2, 0x7}}, [0x1, 0x100000000, 0x100000001, 0x8000, 0x7, 0x731c, 0x5, 0x6, 0x9, 0x3, 0x5, 0x0, 0x1, 0x100000001, 0x8]}, &(0x7f0000000180)=0x100) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000001c0)={0xd749, 0xfca, 0x8000, 0x2, 0x1f, 0x1, 0x0, 0x1, r4}, &(0x7f0000000200)=0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) 05:55:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:28 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x202000, 0x0) ioctl$SG_SET_DEBUG(r1, 0x227e, &(0x7f0000000080)) syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000400)={0x0, 0x1000, "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"}, &(0x7f0000000100)=0x1008) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000140)={r2}, 0x8) 05:55:28 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000040)=[@in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e23, 0x0, @mcast2, 0x7f}], 0x3c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:28 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r0, 0xc038563b, &(0x7f0000000040)={0x1, 0x0, {0x2, 0x400, 0x2, 0x8}}) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080), &(0x7f00000000c0)=0x4) epoll_create(0x0) socket$inet_udp(0x2, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:28 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) 05:55:28 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_netdev_private(r1, 0x89fd, &(0x7f0000000040)="217cdd4457d3531d17cbd0e1817e07f5a5ae19c29191d023a6a4bdcf8bb20da8b45412933688b566c5a53a8d997379aa088963591f9fcf9dc528f19545e934573de84dce6e657c6a68ce4b2e202f1f20bda40b63bcef7f7a273ca33acb4182c67ef2a39b7f7ab89247b579c4c415497115808221cfb71c283cbee55eb5ecb8507dfbe6a09a9f73758a310af93861f54dd025de071438bd97291f26079d8737") bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:28 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x1, 0x2) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x9, 0xa0000) open_by_handle_at(r0, &(0x7f0000000180)={0x2a, 0xfffffffffffffffa, "ebb88a1903870cca862c8e14dfc84e9e92dbe7b869982b7555fbd5d83656e5faa9cc"}, 0x2000) r1 = accept(0xffffffffffffffff, &(0x7f00000000c0)=@ethernet={0x0, @link_local}, &(0x7f0000000140)=0x80) accept$alg(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:28 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:28 executing program 5: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000012000/0x4000)=nil, 0x4000}, 0x1}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000005000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000140)="65d9f3ba2000b0e1eed9ff66b8c4b800000f23c00f21f86635000005000f23f80f01d1baf80c66b8a322e48266efbafc0cb09dee6726670f32670fb2aec1cb0000ff22c02200", 0x46}], 0x1, 0x0, 0x0, 0x227) ioctl$KVM_RUN(r4, 0xae80, 0x0) close(r0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r6, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x3e, "0a35eab653d90cad98372da4ff9a44f96867a30ac07215c42f177b66187f81d91a8f7ba448b0ed886c685cea9ca9c3515304d0e7d62538618cc14f68181c"}, &(0x7f0000000240)=0x46) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000002c0)={r7, 0x2}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x19) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r8, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$sock_SIOCGPGRP(r6, 0x8904, &(0x7f0000000000)) [ 882.222849] *** Guest State *** [ 882.277997] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 05:55:28 executing program 1: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) recvmmsg(r0, 0x0, 0xffffffffffffffe5, 0x40, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'bond_slave_0\x00', {0x2, 0x4e24, @multicast2}}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = dup2(r0, r1) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000080)={r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:28 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000040)="bb34ef27c44fa7ae4379e23a024f54a08a1b7accd4e266268cc8efaac6eb0b", 0x1f) epoll_create(0x8000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000100)={r1, 0x50, &(0x7f0000000080)}, 0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 882.346333] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 882.426757] CR3 = 0x0000000000000000 [ 882.458032] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 882.494393] RFLAGS=0x00000002 DR7 = 0x0000000000000400 05:55:29 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x338e, 0xffffffffffffffff, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 882.534641] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 882.607598] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 882.664625] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 882.712327] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 882.781036] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 882.828311] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 882.872518] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 882.929889] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 882.949723] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 05:55:29 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:29 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0xc4, 0x0) accept$alg(r0, 0x0, 0x0) r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$set_timeout(0xf, r1, 0x3) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000040)='systemem0-\x00'}, 0x30) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x8) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f0000000180)=0x54c1, 0x4) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r3, &(0x7f0000000400)="900585235668c889ff47e562915056ad21a45d5b33933261dd7c9b18a1b45e9c4bd60622ba0d22b24b0edcf82f2765631f514838ec6969925a366c27f01e2a4a3d5694b046ca7da54d2940ecc05e51d765cc95bb26d94dffe87581a20c8a9e950400000000000000c08bf80e497e5fc94f4b37c39cfe8a25d9650753d9d33d5746b7b60ed3a94ff2b69e24c5fff8e5259831b11d7bf75a5e0c1780a31039f39095700faed9393d21aad41a3075c1a78c1a72cd1e729ceb6a0e1e47e26f4e8ca15db5fdcd3449560000000000000000b70000", 0x0}, 0xfffffded) 05:55:29 executing program 1: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1b1c00, 0x0) recvmmsg(r0, 0x0, 0x1e0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000140)='#', 0x0}, 0xfffffe7f) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1) 05:55:29 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req={0xffffffffffffff51, 0x6, 0x1f, 0x4800000000000000}, 0x10) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0xfffffffffffffe30, 0xfffffffffffffffe) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000100)={'hsr0\x00', {0x2, 0x4e24, @loopback}}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x8) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f00000000c0)={0x7, {0x0, 0x9, 0x3, 0x800, 0x2, 0x80000000}}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x9a1ffdf5ff4d2291, "e4ffbceee7467974"}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) [ 882.979813] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 882.992160] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 883.010878] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 883.024737] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 883.057189] Interruptibility = 00000000 ActivityState = 00000000 [ 883.089451] *** Host State *** [ 883.105519] RIP = 0xffffffff811f97e0 RSP = 0xffff888031457670 [ 883.144595] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 883.165587] FSBase=00007f1fee1d9700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 883.202523] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 883.214119] CR0=0000000080050033 CR3=000000008c13a000 CR4=00000000001426f0 [ 883.221177] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 883.265592] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 883.271663] *** Control State *** [ 883.294077] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 883.318806] EntryControls=0000d1ff ExitControls=002fefff [ 883.336665] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 883.343631] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 883.384008] VMExit: intr_info=00000000 errcode=00000000 ilen=00000001 [ 883.390621] reason=80000021 qualification=0000000000000000 [ 883.429854] IDTVectoring: info=00000000 errcode=00000000 [ 883.435455] TSC Offset = 0xfffffe2544863036 [ 883.449821] EPT pointer = 0x000000008e4e001e 05:55:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) shutdown(r0, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000140)={@local, @multicast2}, 0x8) socket$inet_dccp(0x2, 0x6, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000040)={0x0, 0x9, 0x30}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000000c0)={r3, 0x20}, &(0x7f0000000100)=0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:30 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0xb46f, 0x338d, 0x2, 0x4, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:30 executing program 4: openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x10100, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0xfffffffffffffe3a) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000140)={{{@in=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@initdev}}, &(0x7f0000000240)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x6, &(0x7f0000000040)=@framed={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5}, [@ldst={0x3, 0x3, 0x7, 0x9, 0xb, 0x2, 0xfffffffffffffff0}, @jmp={0x5, 0x243, 0x3, 0xa, 0x0, 0x8, 0xfffffffffffffffd}, @generic={0x7, 0xffff, 0x5, 0x8, 0x2}]}, &(0x7f0000000080)='GPL\x00', 0x7fff, 0x57, &(0x7f00000000c0)=""/87, 0x41100, 0x1, [], r2, 0xe}, 0x48) 05:55:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = epoll_create(0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r6 = gettid() stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r1, 0x10, &(0x7f0000000580)={0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f00000006c0)=0xe8) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700)={0x0, 0x0, 0x0}, &(0x7f0000000740)=0xc) r12 = accept4$packet(r0, &(0x7f0000000840)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000880)=0x14, 0x800) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000008c0)=0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000780)={0x8000, 0x0}) ioctl$DRM_IOCTL_SG_FREE(r0, 0x40106439, &(0x7f00000007c0)={0x21f, r14}) r15 = geteuid() fstat(r3, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000ac0)={&(0x7f0000000040)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)="69700b8b424dcb4da08f8dd5b500b203a2410911a5d053ee2e257ddcb5297a3556be1b9a34e71775c7b7e23bf1ba1ef47bdacc6f90121e4942bbcbb379d2167191f60938848ae179d15a0697db24e5bfb7a7cfdc9fa8068cbd85f5", 0x5b}, {&(0x7f0000000140)="795a939028fa0f3a9149922d0cbcd0e3aa698ef6920dce61607c74e9237c2107f2518d16987048211a880c3e9a9df577b53815179991d92376098e1ba50d414d3fb55875de8b1db6edc243eaea790f7edb408d57ce3cbc74ec37666c2ec07d2f56b85f47399ea146108f1407364ad2d29a2cc7e523b5b34564627f6b80fb75c8f5b58d2ab7d808f1b41ff3dc16092b4196242665a46f4c8e63e634475794bf1b4f4f8b5fb4cf09618fbf4f83030ef0df2b2fdc59e2e44a8ae2a9e77a332804c25a53c4cb8748b8c60d019eb20c5b", 0xce}, {&(0x7f00000002c0)="be4899e9ccaac4b27c0f0a0a91ca650525f947c0bdb47632cb6c73fdb1026c7df467904a4c30688a9d67b8a0800b9c6cb32bb732abc1aca3e7886f2242ec26f0bd3f1e0acd0bfc29546d287f509f1370ae54d6a0a35f9520c685d940b4dac0d66713d9cd373aee1a03697b2b22647638629a2dae371b34dedfea778a8f4bf050710506a5de0b22fbaa5d44acf0f782db88645f0c5ab6742726dcdbb67c2a444e40ff183eae30c29d6c7cf8ce782b625ac92016ac4468f66f2466f35be8", 0xbd}], 0x3, &(0x7f0000000980)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r6, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r5, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r2, @ANYRES32=r1, @ANYRES32=r4, @ANYRES32=r1, @ANYRES32=r5, @ANYRES32=r5, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000030000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000000017da3264da", @ANYRES32=r5, @ANYRES32=r3, @ANYRES32=r5, @ANYRES32=r3, @ANYRES32=r12, @ANYRES32=r3, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r13, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32=r4, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r4], 0x138, 0x8010}, 0x24000000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r5, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:30 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x80, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x36, "e8d172ad00b7109bf8a5b4c6bd2f4ea45c5b28ce449643d9524b50f6e5ae3a4be067dc49aaf71b34495c9f9adbaf141530e3c5e986cf"}, &(0x7f00000002c0)=0x5a) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:30 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x100000000, 0xffff, 0x40, 0x5, 0x4, 0x401}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:30 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x6, r0, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) epoll_create(0x0) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000080)={0x0, 0x1a, 0x1, &(0x7f0000000040)=0x200}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x400000000000, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000100)="6349defba7e8494bd67f028f2604e59af8a86a43b94db9d0a5fef01e80000000a83c15cbfa8309490c87214ecb4e828a020bfa07b042f1d9b658b99f90455040401f9acb70dddd76754fb532995a84a9b424cfc429ea4eb425d539fa3a2944359c8ef1c2ba47bee976cb9c4d8d873792ae0790a562dc5fa22306b0f0bd291de7584d3df44e0be1a309439a49d916f7216174e8bc78df42aa999fe1126e269ad60951c6daddf874b2b4305e8c6c444dda378318ef2b603f29a0d569e57d", 0x0}, 0x2e0) 05:55:30 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x6) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:30 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x102, 0x0) recvmmsg(r0, 0x0, 0xfffffffffffffe0b, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x585, 0x9, 0x7}) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'U+', 0x8}, 0x28, 0x3) 05:55:30 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x54200, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x0, 0x6, 0x9, 0xf9, 0x0, 0xffffffff}) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/165, 0xa5) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:31 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:31 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x820c0, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000080)={0x7, 0x9}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x200001, 0x338d, 0x8, 0x8000000000, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:31 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x80080, 0x0) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000080)) write(r0, &(0x7f00000000c0)="53ca611054327aeba27f4ae8d1d6c33120eae1c3d7f0a9c672b94517bb911b878518", 0x22) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:31 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept4(r0, 0x0, &(0x7f0000000040), 0x80000) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000080)={{0x88, @loopback, 0x4e24, 0x1, 'sed\x00', 0x16, 0x40, 0x3}, {@broadcast, 0x4e22, 0x2, 0x5, 0x401, 0x5}}, 0x44) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:31 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) r1 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x2, 0x2) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0x1008000) 05:55:31 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x8000, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x81, &(0x7f00000000c0)=0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:31 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) syz_open_procfs(r2, &(0x7f0000000080)='net/connector\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:31 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0xc004, 0x400000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:31 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r0, &(0x7f0000000280)='G', 0x0}, 0x18) 05:55:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:31 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1, 0x2}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:32 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) socket$alg(0x26, 0x5, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:32 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x0, 0x0) openat$cgroup_int(r0, &(0x7f0000000080)='hugetlb.2MB.failcnt\x00', 0x2, 0x0) mq_open(&(0x7f00000000c0)='/dev/null\x00', 0x800, 0x80, &(0x7f0000000100)={0xffffffffffffff31, 0x1, 0x100000000, 0x81e, 0x4, 0x59d6, 0xffffffffffffff50, 0x3}) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000040)) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) bind(r2, &(0x7f0000000140)=@caif=@util={0x25, "ed02d4f39eccfdbe97b64886fd72848d"}, 0x80) 05:55:32 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x18182, 0x0) write$cgroup_int(r1, &(0x7f0000000080)=0xff, 0x12) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:32 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) write$nbd(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="67446698010000000200000002000000b69952d66f2a4dc69e2dee40cc4d90b10f495845837fca49051ccb2900dff753de6368242214efcbf2fa753a68c12f39d22aacd92c4e75f5d33018f4546f5c0eacd0d4c87e3d4cc4469f52baef84115180c8770c65ebd0137b25e2d7d339dbe5ac9aecf4c4145bd9b8b91a3831a4b531667e2c4d3a835d75159085ec625307843c0c3c3e"], 0x40) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000080)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000200)={r2, 0x8da}, 0x8) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x0) socketpair(0xd, 0x80000, 0x3, &(0x7f00000000c0)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) sendto$inet6(r3, &(0x7f0000000240)="e2b93c171474ab", 0x7, 0xf53b95daf04503e7, &(0x7f00000002c0)={0xa, 0x4e20, 0x9, @empty, 0x2}, 0x1c) 05:55:32 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) prctl$PR_SET_FP_MODE(0x2d, 0x2) 05:55:32 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:32 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x40000000003) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r3 = add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f00000002c0)="4b1a46b93cb771c8eb9992853174d3a274a52e617d768683bcb33ab6d4fab760dc9805a4fdc8c18072d92e8a02aba2fdbe8f7db9ba43b81d2b5274cfbf354a9d578074b1fe8633c1f53267349e45536baa0413470978dc63dd94492a8f6beb8e1f31d33b5a8a21aefcbd4bba1bcaacb8c2ac7c525e3f3a88e29ab0e0ff919ee55f8f11b46b72556e4c18bdaa23fe1c097463bb9016eb3a1a205623b0bf8a62859f728ffcee47417b0474bf3ddb48c8c124e3f1045982abdcb42976a7190909c64561088e35127e557fb5", 0xca, 0xfffffffffffffffa) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r0, 0xc0845658, &(0x7f00000004c0)={0x0, @bt={0x9, 0x5, 0x1, 0x1, 0x4, 0x9, 0x4, 0x6, 0x20, 0x2, 0x0, 0x20, 0x2, 0xffffffff, 0xb, 0x4}}) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)="ea263b4795646d44bbbb6ceb33a92090c6c314cae3e933cb7a6268814db54f540316bc20b8e91889ffbe0788e3ec7b8ff111fd33ca1d03462c378f9040f2b8a6f12840b51d620003e120b5353a82d86ac2afd212c9e0a7e3a458824bdea31f35bc769c50c446ad886b748eefa750777208f86d18fecfb052bc07bced79103b9b3bf649fb1a1611a374729bd404acfde33b892c7572e154a228c1cdec6e63c6f8d9c1c3ba9792820434e5", 0xaa, r3) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:32 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x4000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000140)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000002c0)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, r1}, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) flock(r2, 0x4) 05:55:32 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000240)={0x3, 0x7, 0x80000001, 0xfffffffffffffffc}, 0x10) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rfkill\x00', 0x600000, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000300)={0x1df4600000000000, 0x200, 0x0, 0x2, 0x0, 0x101, 0x1ff, 0x2, 0x0}, &(0x7f0000000340)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000380)={r4, 0x6, 0x10}, 0xc) r5 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x42}}}, &(0x7f0000000100)=0x84) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r5, 0x84, 0x17, &(0x7f0000000140)={r6, 0xea74, 0xd3, "75fef9a551fe2254639cde5917045be3ad8c07a80df410d50c9dd0beb3f188aa08035b61096a166a7e2d8a439a0439ab6dc632735c45641f50f493baf82c4016316420365b7f6030740a4e42c29b8d9abdbc36afab0a12ed7d1d8ac414bf1795bc35184c2ec1acd498c3a35699c5c83c80658eba6d751a71b353fad633b2ba18bbe81ae47fb682bb0321245f3bc4b3f8f900d06d585187578bf5efac9300b979e0a04405ab5ba91d74aa17a2f236c59488674be994c4221f7eacf53314ad344425d8fa0f87f941f0ff7dfc9e08878d496758fe"}, 0xdb) [ 886.054002] net_ratelimit: 20 callbacks suppressed [ 886.054010] protocol 88fb is buggy, dev hsr_slave_0 [ 886.064114] protocol 88fb is buggy, dev hsr_slave_1 [ 886.294070] protocol 88fb is buggy, dev hsr_slave_0 [ 886.299238] protocol 88fb is buggy, dev hsr_slave_1 05:55:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:33 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) r1 = dup2(0xffffffffffffff9c, r0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r1, &(0x7f0000000040)="7cb70747ab3ae086a4e112d58e1c92ae0e2f23", &(0x7f0000000080)=""/193}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x1, 0x0, 0x2, 0x0, 0x1, 0x40}, 0x2c) socket$l2tp(0x18, 0x1, 0x1) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:33 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) r1 = dup2(r0, r0) perf_event_open(0x0, 0xffffffffffffffff, 0x6, r1, 0x8) epoll_create(0x0) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x2, 0x1, 0x5}, 0x81}}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x20080, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:33 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) eventfd2(0x8, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) rmdir(&(0x7f0000000040)='./file0\x00') eventfd2(0xff, 0x800) 05:55:33 executing program 4: r0 = syz_open_dev$cec(&(0x7f0000000080)='/dev/cec#\x00', 0x2, 0x2) chroot(&(0x7f00000001c0)='./file0\x00') setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200200, 0x0) accept$alg(r1, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r3 = syz_open_dev$vcsa(0x0, 0x0, 0x80000000000) faccessat(r3, &(0x7f0000000180)='./file0\x00', 0x80, 0x200) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000140)={r4, 0x2}, &(0x7f0000000200)=0x8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:33 executing program 1: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x8000000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0xfffffffffffffff7, 0x338d, 0x20000000002, 0x0, 0x1, 0x4}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 886.534027] protocol 88fb is buggy, dev hsr_slave_0 [ 886.539220] protocol 88fb is buggy, dev hsr_slave_1 [ 886.544400] protocol 88fb is buggy, dev hsr_slave_0 [ 886.549534] protocol 88fb is buggy, dev hsr_slave_1 [ 886.554740] protocol 88fb is buggy, dev hsr_slave_0 [ 886.559826] protocol 88fb is buggy, dev hsr_slave_1 05:55:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000040)=""/70) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0xffffffffffffff14) 05:55:33 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r0 = syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000040)="2390c0bbb04ccecc4854af2d654a2c59c76402542c1dfe3a921e31d8", 0x0}, 0x18) 05:55:33 executing program 1: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@sack_info={r2, 0x10001}, &(0x7f0000000180)=0xc) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_AUDOUT(r1, 0x80345631, &(0x7f0000000080)) set_tid_address(&(0x7f00000001c0)) bind(r0, &(0x7f0000000200)=@rc={0x1f, {0x0, 0x7f, 0x7fff, 0x401, 0x100000001, 0x3}, 0x7d}, 0x80) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:33 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:33 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xb) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000040)) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000080)=0x1b, 0x4) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f00000000c0)=ANY=[@ANYBLOB="0400000000000000000000000000000000000c00"]) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) setsockopt$IP_VS_SO_SET_EDITDEST(r0, 0x0, 0x489, &(0x7f0000000100)={{0x7f, @dev={0xac, 0x14, 0x14, 0x21}, 0x4e23, 0x2, 'ovf\x00', 0x9, 0x6, 0x55}, {@multicast1, 0x4e21, 0x2001, 0xfffffffffffffffe, 0x1, 0x1000}}, 0x44) 05:55:33 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vfio/vfio\x00', 0x0, 0x0) accept$alg(r0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x8, 0x338d, 0x2, 0x0, 0x1}, 0xab) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x4000) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffff9c, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x18, &(0x7f0000000100)={r3, 0x4}, &(0x7f0000000140)=0x8) r4 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f00000001c0)={0xb, 0xa000, {0x0, 0x3ff, 0x7, {0x1, 0x434f}, {0xb0, 0x51fe}, @ramp={0x400, 0xfffffffffffffff9, {0x5, 0x9, 0x7ff, 0x1}}}, {0x0, 0x3, 0x9, {0x401, 0x8}, {0x0, 0x3}, @ramp={0x2, 0x2, {0x400, 0xffff, 0x1, 0x80}}}}) setsockopt$inet_udp_int(r4, 0x11, 0x6f, &(0x7f0000000000)=0xffff, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000380)='/dev/urandom\x00', 0x290000, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) perf_event_open(0x0, r1, 0xfffffbffffffffff, r0, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vfio/vfio\x00', 0xffbfffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0xa, 0x4e22, 0xd37, @dev={0xfe, 0x80, [], 0x1c}, 0x10000}}, 0x6, 0x9, 0xcd, 0x1, 0x12}, &(0x7f0000000180)=0x98) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r2, 0x7862}, &(0x7f0000000200)) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r3, 0x0, 0x98, 0x20000007fc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:34 executing program 4: accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = socket$inet(0x2, 0x6, 0xff) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f00000000c0)="1f798407a5feb43fb2ff49c54efffaf9ccfe35a0c7452cb864ed6136c4b875c7", 0x20) r1 = open(&(0x7f0000000040)='./file0\x00', 0x400040, 0x180) accept$alg(r1, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x5d27, 0x84040) openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x204000, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:34 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6b1b8de3, 0x200000) ioctl$sock_proto_private(r0, 0x89e4, &(0x7f00000000c0)="c12712d5aa16e8425901773fb7f1cb64753e805e07a17e62132d67216c9217bb9f8044a53ba94e4ae5655e1d0307cc11ede30ee080583f45fb71c23d316f088b4f664e39aa23b5978e23245798e0783b99ceb6eb8045128ce1a104a14b198a858d6f3c182f64764828cdec7e6a0749a55f63fde41ec5d9d2ac15a4fd783a558b931aa5adbefcbe") r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) get_robust_list(r2, &(0x7f0000000300)=&(0x7f00000002c0)={&(0x7f0000000240)={&(0x7f0000000200)}}, &(0x7f0000000340)=0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = accept$alg(0xffffffffffffffff, 0x0, 0x0) write$P9_RLINK(r1, &(0x7f0000000180)={0x7, 0x47, 0x1}, 0x7) syz_open_dev$ndb(&(0x7f0000000040)='/dev/nbd#\x00', 0x0, 0x1) syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x10001, 0x10000) sendmmsg$alg(r3, 0x0, 0x0, 0x0) epoll_create(0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={0xffffffffffffffff, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:34 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) uname(&(0x7f0000000040)=""/39) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000100)={r0}) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0xc41, 0x200) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000200)={{0x0, 0x2, 0x4, 0x0, 0x1000}, 0x9, 0x101, 0x100}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000140), &(0x7f0000000180)=0x4) r4 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x48a, 0x8800) openat$cgroup(r4, &(0x7f00000000c0)='syz0\x00', 0x200002, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:34 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x2) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:34 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/dlm_plock\x00', 0x4a4000, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_PLL_SET(r0, 0x40207012, &(0x7f0000000240)={0x7, 0x0, 0x1, 0x2, 0x1, 0x10001}) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r3, &(0x7f0000000040)="3f2bf63242e0eea65303e87ef4ae432e6e102b9db0db5780096b3f431ef91c98d034585a28c005d206a3b4326f44a719655c955aef1a76e73670e7f4b057a59d80e6d5299de4d5637efd698c79102ac313c323", &(0x7f00000000c0)=""/97}, 0x18) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000340)={0xf000004, 0x9, 0x7, [], &(0x7f0000000300)={0x990a77, 0x2, [], @p_u32=&(0x7f00000002c0)=0x7}}) r4 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x27f, 0x0) ioctl$KVM_TRANSLATE(r4, 0xc018ae85, &(0x7f00000001c0)={0xf000, 0x105004, 0x7, 0x1, 0x1ff}) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x81, 0x0) 05:55:34 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000040)=0x0) setpriority(0x2, r2, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000080)="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", 0xfd}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000180)="a759f5d43ec03bd5cacc634bf3deb0ae00d78d21f44c0f724b804c97d57dd93085dfe81be6d8843586aeca1573b088e0786f9ccff0d50733355443bce9c455e2b8bd134a97431d54", 0x48}, {&(0x7f00000002c0)="355231f4659c83452ed86c9160828b2dae07210608295737cb3f31c1dbf821c1fa63092bc88b6f732c1482f52e35faf5cc218b445624630df8ade0a8471426d165d2ccf8e0f0aad4fdc9a79cab4e660f8bd8bc5681cfa521d9269c541ebfa0d0111ea73c0235cbe9aa6168020249f56bb54e82d4744256a954d36ace3767511812b3b6edf7fd565acc056c66a83dd9bf84a00c14e415845a1c00c7a1e43a141ddc700f4c7d9b4f98", 0xa8}], 0x4) sendmmsg$alg(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r1, &(0x7f0000001bc0)=ANY=[@ANYBLOB="7f454c4601670701090000000000000003000300030000000300000038000000a9010000070000000100200001000800b109ff0700000000030000000900000000000000400000000200000040000000800000000100000007000000018000000400000009000000030000006f0000002e1d000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c496029d2e5ad16b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c7d4f96ce5c6fe8c4de205c4bf26d9f3360000000000000000000000000c151036e8072f78f0da10c290cc51794f94895bcb99df79177c8341e69ce250d6e6d42d39ca57a8398c3b923608b9c8f18f3512abe9790c418b20b5075da587b33b30b9eee53e849eff79d63a980149626dae"], 0x678) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:35 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:35 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f00000000c0)="b30f28427d13da2fed9f1fe08c889f", 0x0}, 0xfffffffffffffd9a) 05:55:35 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:35 executing program 4: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x1, 0x2) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) epoll_create(0x7fffffff) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:35 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x10000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6}}, &(0x7f00000001c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@empty, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@remote}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route(r0, &(0x7f0000000440)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x24006100}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)=@ipv6_getnetconf={0x44, 0x52, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@NETCONFA_RP_FILTER={0x8, 0x3, 0x7}, @NETCONFA_IFINDEX={0x8, 0x1, r1}, @NETCONFA_IFINDEX={0x8, 0x1, r2}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x100000000}, @NETCONFA_FORWARDING={0x8, 0x2, 0x4}, @IGNORE_ROUTES_WITH_LINKDOWN={0x8, 0x6, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x10}, 0x40800) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r4, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r3, 0x111, 0x3, 0x0, 0x4) epoll_create(0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000200)={'teql0\x00', 0x200}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r5, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:35 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:35 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000004c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="ec0000003a1f7660ba738edcd5be3458388599cddd70b0bd69353a617aa64e551f6bcd0bc1af93ea7c1525d27b015b140268707afb27039f16aeb29bdc7ecbe1f3d31c953a2a9a01613c0392ac5fed180947449d91df40aea9c921a99919cfafd8284d4b10ff59c4dab3ee0004f527261bf4808b3ccedd20d58f02092fbe88483b667c9bc7c8719edcc2b2b07816140462e0a4968ac95496ab9d06350beb72354b241ecc69350cf1d1938398237cd93058439563293437b190e9d4cc932a86d1ef42853f48fffd6d2aaf265def676b295ff4a689858dfa7f7e83c901a07aa1f65f33a6e5a49a02dc0e0458b9771a00000000000000000000"], &(0x7f0000000140)=0xf4) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r2, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1c}}}}, &(0x7f0000000240)=0x84) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) futex(&(0x7f0000000040)=0x1, 0x7, 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, &(0x7f00000000c0), 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000300)={{0x77359400}, {r4, r5+10000000}}, &(0x7f0000000340)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:36 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0xfffffffffffffbff, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:36 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 889.522432] *** Guest State *** [ 889.528254] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 889.550386] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:55:36 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r1 = syz_open_dev$vcsa(0x0, 0x2c20, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 889.575951] CR3 = 0x0000000000000000 [ 889.580343] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 889.588534] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 889.600174] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 05:55:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 889.669608] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 05:55:36 executing program 5: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) [ 889.739113] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 889.783565] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 05:55:36 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x800000000000000, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 889.834521] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 889.866027] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:55:36 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) [ 889.929034] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 890.010588] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 890.055799] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 890.080652] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 890.122373] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 890.190647] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 890.227143] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 890.243286] Interruptibility = 00000000 ActivityState = 00000000 [ 890.278987] *** Host State *** [ 890.292352] RIP = 0xffffffff811f97e0 RSP = 0xffff88802a3ef670 [ 890.304187] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 890.313866] FSBase=00007f8353660700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 890.372801] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 890.380192] CR0=0000000080050033 CR3=0000000093666000 CR4=00000000001426e0 [ 890.387727] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 890.401343] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 890.407827] *** Control State *** [ 890.411486] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 890.425233] EntryControls=0000d1ff ExitControls=002fefff [ 890.430885] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 890.443171] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 890.451342] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 890.463518] reason=80000021 qualification=0000000000000000 05:55:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBENT(r0, 0x4b46, &(0x7f0000000000)={0x2, 0x1e8, 0x5b7}) setsockopt$ALG_SET_AEAD_AUTHSIZE(r0, 0x117, 0x5, 0x0, 0x100000004) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x6, 0x4, 0x7d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:37 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$void(r0, 0xc0045c79) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, &(0x7f0000000040)={0x3, 0x0, @ioapic={0x4000, 0x3, 0x8, 0x2, 0x0, [{0x770, 0x3, 0x6c9, [], 0x6}, {0x10000, 0x5, 0x9, [], 0x9}, {0x8ba, 0x7fff, 0x0, [], 0x3}, {0x5, 0x6, 0x10001, [], 0xfffffffffffffbff}, {0x100, 0xfffffffffffff99a, 0x6, [], 0x76b}, {0x8, 0x800, 0x2, [], 0x3}, {0x10001, 0x1, 0x8, [], 0x1}, {0x1000, 0x2, 0xfffffffffffffffc, [], 0x5}, {0x7, 0xe, 0x0, [], 0x3}, {0x3, 0x3, 0x0, [], 0x6}, {0x5, 0x1f, 0x8, [], 0x19}, {0x1, 0xdc, 0x7, [], 0x9}, {0x7, 0x3, 0xfff, [], 0x5}, {0x5, 0x6, 0x8, [], 0x7}, {0x3f, 0x200, 0x0, [], 0x3}, {0x3, 0x1, 0x279, [], 0x2}, {0x4, 0x0, 0x4, [], 0x5}, {0x80000001, 0x40, 0x2, [], 0x7}, {0x6, 0x6, 0x8001, [], 0xfffffffffffffffe}, {0x7, 0x10001, 0x6, [], 0x80}, {0x7ff, 0xa, 0x400, [], 0x400}, {0x8262, 0x9, 0xff, [], 0x1}, {0x3, 0x0, 0x6, [], 0x2}, {0x100000000, 0x91, 0x80000001, [], 0x6}]}}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000140)={0x2, 0x0, [{}, {}]}) 05:55:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 890.471356] IDTVectoring: info=00000000 errcode=00000000 [ 890.481666] TSC Offset = 0xfffffe2167c1bae2 [ 890.486393] EPT pointer = 0x0000000059caf01e 05:55:37 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200000, 0x0) epoll_create(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$ASHMEM_GET_SIZE(r0, 0x7704, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000040)) getpid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) perf_event_open(0x0, r3, 0xc, r1, 0x0) epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:37 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpid() r1 = gettid() perf_event_open(0x0, r1, 0xf, r0, 0x2) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f00000000c0)='#', 0x0}, 0xffffffffffffffc3) 05:55:37 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x10, r1, 0x0) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x3, 0x8, 0x3, 0x0, 0x80000001, 0x120, 0x8, 0x10000, 0x6, 0x6c1b, 0x2, 0x0, 0x3, 0x5, 0x9, 0xffffffffffffff75, 0x7fffffff, 0x0, 0x4, 0x69, 0x200, 0x5, 0xfffffffffffffff7, 0x6, 0x3, 0x80000000, 0x8, 0x0, 0x2, 0x8, 0x10000, 0x7, 0x4, 0x1, 0x1, 0x0, 0x2, 0x3, @perf_config_ext={0xfd, 0x7fff}, 0x1000, 0xfffffffffffffffa, 0xff, 0x7, 0xd80, 0xffffffffffffffc1, 0x1}, 0xffffffffffffffff, 0xb, 0xffffffffffffff9c, 0xa) 05:55:37 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:37 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x2) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:38 executing program 4: setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x400000, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x8, 0x338d, 0x4000000002, 0x0, 0xffffffffffffff9c}, 0x2c) syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000080)={'syz_tun\x00', 0xf6c}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000002c0)=ANY=[@ANYRESHEX=r0]) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xffffffffffffffda, 0x7}, 0x10) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000240)={&(0x7f0000000200)=[0x0], 0x1}) 05:55:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:38 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:38 executing program 4: r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) r2 = syz_open_dev$vcsa(0x0, 0x0, 0x0) ioctl$RNDCLEARPOOL(r2, 0x5206, &(0x7f0000000140)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) setsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000040)=0x5, 0x1) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000240)=0x0) wait4(r3, 0x0, 0x60000008, &(0x7f0000000180)) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000100)) ioctl$sock_ifreq(r0, 0x8937, &(0x7f0000000080)={'ip6erspan0\x00', @ifru_names='bridge0\x00'}) ioctl$VIDIOC_G_FREQUENCY(r2, 0xc02c5638, &(0x7f00000000c0)={0x2, 0x5, 0x2}) 05:55:38 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000040)=""/209, 0xd1}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/229, 0xe5}], 0x3, &(0x7f0000000380)=[@rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000000300)=""/33, 0x21}, &(0x7f0000000340), 0x70}}], 0x30, 0x20008040}, 0x84) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$tipc(0x1e, 0x7, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:38 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 891.894749] spurious APIC interrupt through vector ff on CPU#0, should never happen. [ 891.902734] *** Guest State *** [ 891.939773] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 05:55:38 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 892.032536] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 892.054671] CR3 = 0x0000000000000000 05:55:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 892.087043] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 892.143252] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 892.184558] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 892.217588] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 05:55:38 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 892.265952] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 892.294437] net_ratelimit: 20 callbacks suppressed [ 892.294534] protocol 88fb is buggy, dev hsr_slave_0 [ 892.305265] protocol 88fb is buggy, dev hsr_slave_1 [ 892.323129] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 892.374611] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 892.428334] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 892.484417] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:55:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:39 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) [ 892.524880] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 892.533140] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 892.544078] protocol 88fb is buggy, dev hsr_slave_0 [ 892.549237] protocol 88fb is buggy, dev hsr_slave_1 05:55:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 892.774016] protocol 88fb is buggy, dev hsr_slave_0 [ 892.779191] protocol 88fb is buggy, dev hsr_slave_1 [ 892.784418] protocol 88fb is buggy, dev hsr_slave_0 [ 892.789535] protocol 88fb is buggy, dev hsr_slave_1 [ 892.794734] protocol 88fb is buggy, dev hsr_slave_0 [ 892.799833] protocol 88fb is buggy, dev hsr_slave_1 [ 892.883158] IDTR: limit=0x0000ffff, base=0x0000000000000000 05:55:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 892.939773] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 892.984570] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 893.007752] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 893.057985] *** Guest State *** [ 893.061806] Interruptibility = 00000000 ActivityState = 00000000 [ 893.069496] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 893.081113] *** Host State *** [ 893.090201] RIP = 0xffffffff811f97e0 RSP = 0xffff88802cf07670 [ 893.110916] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 893.164542] FSBase=00007fc66933b700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 893.172758] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 893.194497] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 893.201937] CR0=0000000080050033 CR3=000000002bb94000 CR4=00000000001426f0 [ 893.237259] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 893.247004] CR3 = 0x0000000000000000 [ 893.264534] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 893.272016] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 893.294991] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 893.309645] *** Control State *** [ 893.326072] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 893.333461] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 893.347258] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 893.365116] EntryControls=0000d1ff ExitControls=002fefff [ 893.394201] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 893.394373] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 893.425783] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 893.460654] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 893.468462] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 893.469863] VMExit: intr_info=800000ef errcode=00000000 ilen=00000002 [ 893.480296] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 893.483586] reason=80000021 qualification=0000000000000000 [ 893.504614] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 893.510890] IDTVectoring: info=00000000 errcode=00000000 [ 893.519838] TSC Offset = 0xfffffe20180a2bac [ 893.531042] EPT pointer = 0x0000000031d9b01e [ 893.539036] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 893.552606] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 05:55:40 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003c80)={'vcan0\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000003d80)={&(0x7f0000003cc0)={0x1d, r1}, 0x10, &(0x7f0000003d40)={&(0x7f0000003d00)=@can={{0x0, 0x1ff, 0x40, 0x2}, 0x0, 0x2, 0x0, 0x0, "894c3743bdd9b6a4"}, 0x10}, 0x1, 0x0, 0x0, 0x8040}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000004c0)={0x0, @in6={{0xa, 0x4e24, 0x9, @dev={0xfe, 0x80, [], 0x14}, 0x20f7}}, [0x9, 0x7f, 0x8, 0x400, 0xf78, 0x8000, 0x6, 0x0, 0xd5b7, 0xf3f, 0x1, 0x3ff, 0x6b70, 0x401, 0x2]}, &(0x7f0000000240)=0x100) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={r2, 0x8}, &(0x7f0000000440)=0x8) socket$alg(0x26, 0x5, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) r4 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000600)="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") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc) epoll_create(0x100000001) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000040)={0x4, 0xfff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$P9_RSTATu(r6, &(0x7f00000002c0)={0x8a, 0x7d, 0x0, {{0x0, 0x75, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x11, 'posix_acl_access\'', 0x17, 'vboxnet1keyringppp1eth1', 0x11, '/dev/dlm-control\x00', 0x9, '-\'@cgroup'}}}, 0x8a) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r7, 0x0, 0x11, &(0x7f00000002c0)={{{@in6, @in=@multicast2}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000180)=0xe8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000700)={r3, 0x6}, &(0x7f0000000740)=0xc) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={0x0, 0x3}, &(0x7f0000000100)=0x8) prctl$PR_SVE_SET_VL(0x32, 0x3c9e6) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000140)=0x6) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000007c0)={r8, 0x7fffffff00000000}, &(0x7f0000000780)=0x8) r9 = shmget(0x1, 0x1000, 0x2, &(0x7f0000ffd000/0x1000)=nil) shmctl$IPC_INFO(r9, 0x3, &(0x7f0000000080)=""/54) ioctl$KVM_CREATE_IRQCHIP(r0, 0xae60) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r10, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 893.562561] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 893.579051] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 893.590009] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 893.601416] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 893.640147] Interruptibility = 00000000 ActivityState = 00000000 [ 893.704336] *** Host State *** [ 893.708008] RIP = 0xffffffff811f97e0 RSP = 0xffff88802fd47670 05:55:40 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x8000000008, 0x7, 0x338d, 0x20, 0x0, 0x1, 0xfffffffffffffffc}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) [ 893.763515] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 893.816221] FSBase=00007f9c53aca700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 893.864615] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 893.886110] CR0=0000000080050033 CR3=000000006c981000 CR4=00000000001426e0 05:55:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000140)={0x1f, 0xfe, &(0x7f0000000040)="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"}) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000180)=0x100, 0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f00000001c0)={0x0, 0xbf, 0x557e, 0xe1d}, &(0x7f0000000200)=0x10) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000240)={r3, 0x400004a, 0x10}, &(0x7f00000002c0)=0xfffffffffffffd43) [ 893.912731] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 893.941634] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 893.997050] *** Control State *** [ 894.007662] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca 05:55:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x1, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000080)=""/114) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) [ 894.048029] EntryControls=0000d1ff ExitControls=002fefff [ 894.081926] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 05:55:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 894.176159] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 894.205620] VMExit: intr_info=80000306 errcode=00000000 ilen=00000005 [ 894.265034] reason=80000021 qualification=0000000000000000 [ 894.271523] IDTVectoring: info=00000000 errcode=00000000 [ 894.289244] TSC Offset = 0xfffffe1f71f98d3c [ 894.306385] EPT pointer = 0x000000009481c01e 05:55:40 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000002880)=[{0x0, 0x0, &(0x7f0000000700)=[{&(0x7f00000002c0)="9f9a2ebdde5e7add768cb7f936c5569652edef37b1b91916ff55971ed319afdb5557", 0x22}, {&(0x7f00000004c0)="8f08ede7d8e86f78d6021388ac1d6c422753f21e3ff240f90e8c7047a018d16de0fa09a408822d67f196ebd8129d69146df6d89f2fe19e18ae69a307974f9ae9bb88b007169eabd2272071c61434940a0e951fb06f1db7e2a27f4dcba1055e73404a57e38fed2ffb67156beca3aa55e898a2a45a47c519a5b8a4563f9f111b60edcf22b765123e99616f07e5862aff60d93423816edabf0cf05d395959478fb49cdd3a7192742715fb4729a94aa61f894c35c619196b6dcdf21549c7157c1ef0d02066674eacbd3056b2d643509cfa12f8cc3c827db0ed8264363dcc346c696bfa", 0xe1}, {&(0x7f0000000300)="4e2392269f979290f5c1f807bf531c0be92a85f17e46b3692b5a64bdbcae7b0227b3988c6c6ad452422fdaad46314806b70ab153438384f1b1063753416245234ad61463c7dc923e0fc06d8500ad6410ba370c62b6c2be2438a0be5bad7351866db874f2233c49c56d2a94328d16c05cbdef926f92d98e0353a2c22f5fb93aa96964d496f9ebeb9eb77d4bfe3d72de3068ca22aca68f30fa33a2", 0x9a}, {&(0x7f0000000400)}, {&(0x7f00000005c0)="868714665654b104834770f51fd4d666e8056f0078edf2105e352b9e2e166534fe1f8baf9cb8d7f515cc4904b8566a245e54604688693ca4c720de0d1564c042f1255dba743d585415887ac107c290b332dd77e464eda378c559fb0149e54d25344b38993605ad82ddba6f7e705f4964d8c4a3d40ac7a118d6c236f7a5ba9dab9e47523601ed9d10be6ab4e0c8d0b5c8bc0e967c78c25feb0415a9b17f1caf00df1d1c9a61fef5519fc159e717da54aacb5c0c001ae97b2d6dcc9fcb", 0xbc}, {&(0x7f0000000440)="f1c8b36ed1b84d14ac146f517775c373a61e8c8b8da2ff92a10dce0c233b7afd99452d", 0x23}, {&(0x7f0000000680)="a5623b20bfe4e98352d7799baa5ee2236a338cb789eb2cf94616e7b395311342926742989db631d5247f9d9e25a0c2d0f95b48541e312c7ecfdbed0493d79720eab30645f34039344dc6d552b6022e2eea8378fa743f8a4f103afa118d50c75cf355e04f1c0977afb9bf08070bcb165eca7d", 0x72}], 0x7, &(0x7f0000000780)=[@op={0x18}, @assoc={0x18, 0x117, 0x4, 0xfffffffffffffffd}, @assoc={0x18, 0x117, 0x4, 0x85}], 0x48, 0x80}, {0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000800)="28f76f5f07ca6c6e0b5caad0dbd800d99e1b3370ebbff54c832d6bd3b6170c14454c4ab5b28cdc5b85002f3803757a3fed2e4f05b087ff28a17dbb9e2cb1cda080d19fcb29be082c54a20475a2ce5d83ac97ac7a71ee65d4", 0x58}, {&(0x7f0000000880)="e80c1b4da4ed186bb64006792d0e26f0c69a5ab618f8f87651d4d0e8", 0x1c}], 0x2, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], 0x118, 0x800}, {0x0, 0x0, &(0x7f0000000e00)=[{&(0x7f0000000a40)="67d6857f21a8e42d879cb3eb684d6771328d7339c45033255d7918bcc887546e84a6dbb57c75abbb59f6dedcb882a8f13391ba576255ea7999fb6f048460d2c090e1a9e04837d59a3f2a009f72417e5db0280f3be2170febef0dc9fc4f20848d91b036ebaecb0f35cf6e2718cec978e1a0bac391bacc977f0b8b3941d871c744ff7410d2ea0ec68df0a6f2cae792da980970664da640c4e1726cc31314f438f6477d8abecf86273943d179d6bc146b30de421bc658231f7103a4d8185495f5d3cc92da794dc2259f089735b170f31bddb9d2e0644760e9129fc0379cc0e0bd80ffa2555d3927541515", 0xe9}, {&(0x7f0000000b40)="f5b5d0a78b2554009d05fc236f2f8cc287a8dc58c6b210aefc6990c25737deed88e0c8d1115e45e586ec155238e34783c6414d41104ec0e424844680a88ae5eb73df9369b3d1f0906709520640592517e02efce8de62e0bf07e954121b17b70e31362e72406280740a064001eee22f7642419f020948d489acd17de3490f29b2096a6e297aa91ced2bb4443d43f65fedb2297f91da983115668bb413d3610fbaf67c6847f0eb", 0xa6}, {&(0x7f0000000c00)="2b66dab43c6e69ec3842e8bdc826108ff364d3cd4bca1ae433b430de1e7f415eb2dd209de8f823c3122783f4de5bda8fcc0b6f2f46e305b2322bf83d3d41c780f6ca483ffb062ce1aa1a69d9d3ec69a03da65b8f9ced783e8414f778562f44e6bc39506a6dd191ec85d142c9f6342301dddb222cac961d2583de4d478cf98de05b38f3aa42d27f52636c6bc6f22caa5a5901867a9aa916b3f67994a317a7981c31224ae18f7893b14f545af23676905ba111f06889ea0882c11b5b8cb934a88b106c5584a2e298e2aa1f9549c6e1a21def33c79ea2cd98c3a9b2d18f7d8199dae0f7db5d62cc", 0xe6}, {&(0x7f0000000d00)="d9f3cf555f9962d76f9d3322d2186f5b1ab32394f0936a51044e0f4265941ac93cf9299accb3dfbbc6a605b5dce1aa6b95f211cc0309279edf54e09648193b69c145e114092d0c6ee8ad8fc400c6ed3cf4c73eb76f16a6274c17fa6887", 0x5d}, {&(0x7f0000000d80)="762b6d4d0f2bd64784bbee32c5eebfbb4223d9402193a9651f19c852b0026d767a5c740215fecb0df57d21e4438da557b5b084e5bc8d46204edfc705c5ebb21a56abdf2205464f05fb408be0f343736e41263ea657730b436ca046b1366af770777937f975e0bf714637fdfc366e4981f7df7f4637139557c5", 0x79}], 0x5, &(0x7f0000000e80)=[@iv={0xc8, 0x117, 0x2, 0xb0, "5f19e10e9d6730121bd3c48c62906a79aa7b31f38eab678f32426cabe52594d911eac31f5062a51d21609f65424d3fd0cdc68dc4c0e6c6a2b5ddb0f7593ab2466c43f9150354f77dbf632065c65197ca493c7d5baa0fd7ba20bcb588342b1e22496e9f3ae556b0daa58129630a485184a9933beffd0235e151ab2ca3eeb1b2f06ccece606fccd6a15b3a1f7809237e38dfc16716d8f5f5573d2138f75d9bb22601a300ecff51b0870e38ec65926d9536"}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x18}, @iv={0x48, 0x117, 0x2, 0x2e, "93651a0807a0ccdaaa8ee0bf4c5952907e25ab0a781ddd1394e821ea863c1a4e3a3b910dd4ee8dd71bfa2b10f7b1"}, @assoc={0x18, 0x117, 0x4, 0x4}, @iv={0x1018, 0x117, 0x2, 0x1000, "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"}, @iv={0xc0, 0x117, 0x2, 0xa7, "cb96a2bb3dc61565e668cce4cfd429c57d1eea062604a65cedd1076cbf7010acf3ce7af10ac5d6f300d587c185cf8560e498f85f27ce946b70b829dcc11d5b93b9fdd71340dc804e4430e45516fb4d80950999b60f7b71a8ad7a3d8243f97503c5e3eaa9ccc45eefc07dc180f5add832b75e34f9539d874876c820a579f0dd4129bcfdf6c8a6db45f9c5281ce0886a2e43d3a7c3b5efeca762f6317f531ab6757673b552c95bcf"}, @op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x897}], 0x1260, 0x4000}, {0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000002100)="3ecc2b8b818ebc6bd94b464b5a59b0a2caa022d55c5fb9aec0aa7e3c3798f63b17c7867b91d68e1a4e78ca1c22dc7e72011b71eaab28bd5036783f88c4e85a6240fd9ffc6693b2709caffd60f1adf63d7e3fde48da69eefd903e8aefd0e2d8059a57a9eaa816edd40d0043efa6684816a5f190b7049665418ae1065707efa01b23b0747f572221d67e4e3a384a85621a6a9dc6d38333b81ae45f29c1dcef64f2419f0a7ce2262b08b8185040f3a4e1e0a7b9cf37a0bbeb04", 0xb8}, {&(0x7f00000021c0)="d89efb5b43ed0e3bc53e427a1dccfbc545dd3ef524bf62b1ed6684d451d352ba574a26fd3b7cd07cc312ab31ba6a21a9aab81cc399c1", 0x36}, {&(0x7f0000002200)="442e66938d0eb6d5cba6612c007a87c4378c990648bad87a2bb9bec18e120bc42189796f1f653d6b70e6bdff2348879bd21d28f5b783a57a8c7c99c1e961597d458488ea51a558dcb8bb2ae440c1f645103615de534e3ad26fd5a43810a098402483e911aec12b0dce3d1680020d42f4f68518dac0fce547d0b1551529fe430cfa2f32f781ae3071a74e2c13f961a3d639928d6ac4eb9ad2f5cf4994179596345648571e3b9b4216759938c5ac12685d763f717e304946918dc1bf391c071c2966e84c2faf140622475f6351f153ad9db291c6b0dbdaf60c5f60812ac84ef3d3bd9d6949b2386b7e6fba0013", 0xec}, {&(0x7f0000002300)="afc57ac5b1d22197ea3ca03cf888fd65855dc9bbad2c13ce23e73b", 0x1b}, {&(0x7f0000002340)="c48708d6eefa2bf27dcf33974c9c0f", 0xf}], 0x5, &(0x7f0000002400)=[@assoc={0x18, 0x117, 0x4, 0x2}, @iv={0x48, 0x117, 0x2, 0x30, "a09ad133af9ecf3bc8c21751204a645f02938dc7456a518b5a4396d218e25fe69cab0ccfb4785ed8cc33984de3baa194"}, @assoc={0x18, 0x117, 0x4, 0x7}], 0x78, 0x40}, {0x0, 0x0, &(0x7f0000002640)=[{&(0x7f0000002480)="4d57099a8ba78de3043c2b19cfe1eec35cf40d85667ee0e02025e39f54af34d9843f391cdfc6ec6ddcb07ad5e28949816f4cca534e26c12e2f6a4b4ffef7e2c4e204735ebb50328992b792fdc708b9f4ce39fb34c46cd6b7048a5a43c6643d02bcba39167465c65990c6f2c43f54bd5a2ff203ad8a90750943810bb23317d35092e131fdfbff7b", 0x87}, {&(0x7f0000002540)="cd4af6de74e898ed71b603d2d56bb046269fe37d95aa10fbe374d9a1937e98937947ab88d173c57d53c1c8c91b0876defc28c3c2f2e12129556d2ff28f", 0x3d}, {&(0x7f0000002580)="f86f29734fac3254d60edf90f5f21250bda24d9669257305bca92891c84315e6159e0674513d398c099eb96ea590769d4b1dfa992cdbf270776092d99a75c5", 0x3f}, {&(0x7f00000025c0)="506ca4e44125d2355449681cf50f014ca348500e2899607d6c237e0329a7c0b6bc7da5ec5c2ab9c6997888d5cf362ec0596b739b26c828830f780a02f025b05c8514d536121dd6e3345f88422a2af8b6", 0x50}], 0x4, 0x0, 0x0, 0x850}, {0x0, 0x0, &(0x7f0000002780)=[{&(0x7f0000002680)="477f51c9de3efeffa20109c7ca7bf058d4d2ecf4724c3e096064abfcb7a46f6ae7574444c182983b2cb427cd4593933a717123924dfdb084db03e64f3c97817d19a39cdf54fcc5f4568c713599daaf85b5bddf2ff8b88187cc9f9b202c1b0d5c247bafb98972cebb1735b5ceb01d57d71013b50d92bc02e49ed245c8dfa475452dff821c12473b470aeff949648951407a6c7367c1217d5008aff0da192bb455fda5210bf5c41e58c1a40fac2ee89fa8f6907a822fa3327672c66d0688f807ec31d8c364", 0xc4}], 0x1, &(0x7f00000027c0)=[@iv={0xb0, 0x117, 0x2, 0x9b, "f40b3469e855b502044c8f95884b43c664d2682d0133a7026158a74f2e3dbab4a0f183c32cc009e983f9219c238d1bb8618ac2438c7e5544c7986f74765cc37fad4851bc0dfda8e6d301fdb7c33d38bfe1cfb33758a1d2a9b5763df3bc8bd4b3b2d1bde6d3dab637563b2685649caf8b6f77ffce254acd6f392c4b42cbe9800fc85225f39c0bd85c6a011c57b97f2d6c01d7fcf26a75777afd34ed"}], 0xb0, 0x24044040}], 0x6, 0x40001) openat$cgroup(r0, &(0x7f0000000100)='syz1\x00', 0x200002, 0x0) r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000040)={@dev, @empty, 0x0}, &(0x7f0000000080)=0xc) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x43, r4}) epoll_create(0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r5, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000002a80)={0xcee9, 0xffffffffffff81f5, 0x10000, 0x200, 0xffffffffffffffef}) ioctl$KVM_IRQ_LINE_STATUS(r0, 0xc008ae67, &(0x7f0000002ac0)={0x9, 0x3ff}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@multicast2, @in6=@initdev}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r0, 0x40045730, &(0x7f0000000400)=0x1ff) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000002a00)={0x1f, "e7fba4c977baf621a293522568e4fed7e548ae2fd3023bb706dea066b9edd2dc", 0x3, 0x10, 0x0, 0x3ff, 0x4, 0x0, 0x650a978b, 0x8000}) 05:55:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) fstatfs(r0, &(0x7f0000000080)=""/118) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) fanotify_mark(r0, 0x0, 0x20, r0, &(0x7f0000000040)='./file0\x00') 05:55:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:41 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x5, r2, 0x1, 0xffffffff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xd, r0, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:41 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:41 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:41 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r0, 0x4010ae74, &(0x7f0000000040)={0x2, 0x3}) accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x1, 0xffffffffffffffff, 0xffffffffffffff7f) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$TIOCNXCL(r0, 0x540d) 05:55:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r0, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:42 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:42 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:42 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = epoll_create(0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, r0}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) [ 896.354394] cgroup: fork rejected by pids controller in /syz0 05:55:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:43 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00') perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$KVM_GET_MSR_INDEX_LIST(r0, 0xc004ae02, &(0x7f0000000180)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x6000, 0x1) 05:55:43 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:43 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x10058, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000040)) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) listen(r1, 0x1) [ 896.830129] *** Guest State *** 05:55:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 896.904885] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 05:55:43 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={r1, &(0x7f0000000280)='#', 0x0}, 0xffb3) 05:55:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 897.004783] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 897.088524] CR3 = 0x0000000000000000 [ 897.106939] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 05:55:43 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) [ 897.171319] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 897.194775] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 897.201723] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 897.276859] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:55:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 897.332969] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 05:55:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:44 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000400)="1029a57652c36c0dcd9b8c597cdf") perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_XCRS(r0, 0x8188aea6, &(0x7f0000000440)={0x1, 0x8, [{0x1, 0x0, 0x3}]}) sendmmsg$alg(r1, 0x0, 0x0, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000040)={0x80, {{0xa, 0x4e21, 0x1ff, @remote, 0x7ff}}}, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_id=0x0, &(0x7f0000000140)=0x4) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r2, 0x3e3, 0xff, 0x0, 0x100, 0x1}, &(0x7f00000001c0)=0x14) epoll_create(0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) mknod$loop(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f00000004c0)={0x6, @win={{0xfffffffffffffeff, 0x8, 0x7ff, 0xffff}, 0x7, 0x3, &(0x7f00000002c0)={{0x3, 0x1, 0x73, 0x6}, &(0x7f0000000240)={{0x9, 0xf306, 0x8f, 0x5}, &(0x7f0000000200)={{0xfffffffffffff4cb, 0x4, 0x3, 0x2}}}}, 0x3, &(0x7f0000000300)="7e6a9f9400436da5aa5d3444b62cb8c98f9a968ddd9b52f9c0d106a3eb747d7f797519b02d8a406a0a75feb719e58d5176fe2a8af7fc4c67295d92bd1ac51ff914f515154d3c732cdb1b36946f2dbc0748206b738bc3f2e38f86d66ede67d0f8b879fa25bf53a849b621d56ccd4cc95e6ef19aebd842477071e13847a6313831593f7b00e01184c4ca9bcb0f19e655584eda8cc82dda0664766c0cb908481f048d6b136b3718ddb319057774ffbff0f1f7804f3656461da9dc", 0x6}}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) [ 897.446441] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:55:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 897.515081] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 897.564396] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 897.572584] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 897.595668] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 897.646307] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 897.701882] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 897.729879] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 897.764653] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 897.810507] Interruptibility = 00000000 ActivityState = 00000000 [ 897.854368] *** Host State *** [ 897.875055] RIP = 0xffffffff811f97e0 RSP = 0xffff88803466f670 [ 897.914174] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 897.951891] FSBase=00007f9c53aca700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 897.998700] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 898.031507] CR0=0000000080050033 CR3=000000009c806000 CR4=00000000001426f0 [ 898.070634] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 898.108693] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 898.140381] *** Control State *** [ 898.153697] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 898.163433] EntryControls=0000d1ff ExitControls=002fefff [ 898.172701] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 898.188256] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 898.200955] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 898.212247] reason=80000021 qualification=0000000000000000 [ 898.261530] IDTVectoring: info=00000000 errcode=00000000 [ 898.274652] TSC Offset = 0xfffffe1d7ff35362 [ 898.279321] EPT pointer = 0x0000000098afb01e [ 898.535767] net_ratelimit: 20 callbacks suppressed [ 898.535860] protocol 88fb is buggy, dev hsr_slave_0 [ 898.546117] protocol 88fb is buggy, dev hsr_slave_1 05:55:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:45 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:45 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getgid() fstat(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000380), &(0x7f00000004c0)=0x0, &(0x7f0000000500)) stat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getresgid(&(0x7f0000000680), &(0x7f00000006c0)=0x0, &(0x7f0000000700)) r12 = getegid() getresgid(&(0x7f0000000740), &(0x7f0000000780)=0x0, &(0x7f00000007c0)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0, 0x0}, &(0x7f0000000840)=0xc) fsetxattr$system_posix_acl(r1, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000000880)={{}, {0x1, 0x2}, [{0x2, 0x5, r3}, {0x2, 0x2, r4}], {0x4, 0x6}, [{0x8, 0x2, r5}, {0x8, 0x0, r6}, {0x8, 0x4, r7}, {0x8, 0x7, r8}, {0x8, 0x5, r9}, {0x8, 0x3, r10}, {0x8, 0x5, r11}, {0x8, 0x3, r12}, {0x8, 0x0, r13}, {0x8, 0x4, r14}], {0x10, 0x3}, {0x20, 0x2}}, 0x84, 0x3) r15 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) syz_open_dev$vcsn(&(0x7f0000000940)='/dev/vcs#\x00', 0x80000000, 0x400002) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r15, &(0x7f0000000280)='#', 0x0}, 0x18) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x101000, 0x0) setitimer(0x0, &(0x7f0000000980)={{0x0, 0x2710}, {0x0, 0x2710}}, &(0x7f00000009c0)) [ 898.774077] protocol 88fb is buggy, dev hsr_slave_0 [ 898.779183] protocol 88fb is buggy, dev hsr_slave_1 05:55:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:45 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:45 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 899.014058] protocol 88fb is buggy, dev hsr_slave_0 [ 899.019174] protocol 88fb is buggy, dev hsr_slave_1 [ 899.024366] protocol 88fb is buggy, dev hsr_slave_0 [ 899.029457] protocol 88fb is buggy, dev hsr_slave_1 [ 899.034653] protocol 88fb is buggy, dev hsr_slave_0 [ 899.039746] protocol 88fb is buggy, dev hsr_slave_1 05:55:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:45 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) ioctl(r2, 0x3, &(0x7f00000005c0)="12a0240057009376c412c7de38dd2da95323b476a99800ce3e2384c862b86fc38ecac62959bfff2ff28e7824d632de9f73250200f83883d89d591f66354bf0d0976a3f78ba82d1b55a7bf86f0cde8b86140905b6abbfad5daae74d10fb047b7b2ab7e23bf9eb0eb1947dac33e787e582868d1e3e12cd0aff38870cdb8eef8559912684ba67b8a8ec10f2d199cd8fc9745074287101ffc050a61092eb969bff8d6e442fd24ea5cfd2a28326359b5fda9e4fb88d59b447ee79e892ed05658cd579d44d7a83ec2caa18cc4475103dcd2125fcf9d565") sendmmsg$alg(r2, 0x0, 0x0, 0x0) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000000)={0x7, "2409edadd53cc49f01d5fcc2f5570f306992f64d37f24037c2fa8dc2ec29fdc2", 0x1}) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x80a, 0x4) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x6, 0x40000000004, 0x338d, 0x2, 0x0, r2}, 0x2c) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x3000)=nil, 0x3000}, &(0x7f0000000100)=0x10) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:46 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:46 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:46 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:46 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) getpgid(0xffffffffffffffff) r1 = gettid() perf_event_open(0x0, r1, 0x9, 0xffffffffffffffff, 0xb) r2 = epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000040)=ANY=[@ANYBLOB="7fffffffffffffff000000000000000000000000f8ffffff0100000000000000040000000000000004000000000000000200000000000000000000000000000000000000000020e002040000000000000000000000000000"]) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:46 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$KVM_GET_REG_LIST(r0, 0xc008aeb0, &(0x7f0000000040)={0x2, [0xed, 0x3ff]}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x3390, 0x8000) 05:55:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:46 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) sync_file_range(r0, 0x4, 0x8, 0x6) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) perf_event_open(0x0, r2, 0x1, 0xffffffffffffffff, 0x0) epoll_create(0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000004c0)=""/4096) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:47 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:47 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:47 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) rt_sigpending(&(0x7f0000000040), 0x8) timer_create(0x7, &(0x7f0000000080)={0x0, 0x3e, 0x6}, &(0x7f00000000c0)=0x0) timer_settime(r2, 0x1, &(0x7f0000000100)={{0x77359400}}, &(0x7f0000000140)) 05:55:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:47 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:47 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) recvmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/112, 0x70}, {&(0x7f0000000140)=""/42, 0x2a}], 0x2, &(0x7f00000001c0)=""/181, 0xb5}, 0x1) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000300)={@remote, 0xd, r3}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:48 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r2, 0x0, 0x0, 0x0) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)) ioctl$BLKALIGNOFF(r0, 0x127a, &(0x7f0000000040)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) dup3(r2, r1, 0x80000) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:48 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) connect$l2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, r0, 0x3, 0x3, 0x4, 0x3, {0xa, 0x4e23, 0x0, @ipv4={[], [], @rand_addr=0x4}, 0x5}}}, 0x3a) 05:55:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:48 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:48 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) bind$netlink(r1, &(0x7f00000001c0)={0x10, 0x0, 0x25dfdbfb, 0x8800002}, 0xc) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) epoll_create(0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205648, &(0x7f0000000180)={0x9b0004, 0x4, 0x7, [], &(0x7f0000000140)={0x9b095b, 0xd5, [], @p_u8=&(0x7f0000000100)=0x86a7}}) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f00000002c0)={0x63, 0x20, &(0x7f0000000200)="cb02186d22132d346dc2c0f2ecdceca6b37f4e84103ea4cd107db26f44740ca49bd3244860982e261e4ceac825afb9c7af19eb7ce8275a0b18bc42586c4976ff87e5606660f68f826cc8", {0x7, 0x7, 0x74737f77, 0x7, 0x3f, 0xec47382, 0x0, 0x8}}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) setsockopt$inet6_buf(r0, 0x29, 0xeb, &(0x7f0000000040)="86f0be5661f5fda99b1acb58f1cecb4723080c5e29fb887d65b2ab4d46f2e6e64b916b4b4325a863652c1d10e2f18942cb73c6c348644d624130e9cd5e1e86d712b4087c5c599518202da1e1103132d450b51c937646aa1eef0e0d5a982d05f46dfffc0b731a71e6f21939da2e12e7da70d16ea7e221fa1b7ac0e8a2a73fc8cfbeb13deea4c94fc6e346d497797bc1236d0b763a3f55b097764d23859bb49dd9d8557d7ef50c6fd1b2ae0c016f6c067d58d88cadb002dc2df9719c4ef9e46b2c", 0xc0) 05:55:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x20000080) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f00000001c0)={0x32, 0x34, 0x15, 0x3, 0x1, 0x7ff, 0x0, 0xce, 0xffffffffffffffff}) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) ioctl$RTC_UIE_OFF(r0, 0x7004) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000100)=""/117, &(0x7f0000000180)=0x75) 05:55:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:49 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) get_robust_list(r2, &(0x7f00000000c0)=&(0x7f0000000080), &(0x7f0000000100)=0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:50 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:50 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000040)=0x7e, 0x4) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) r3 = shmget$private(0x0, 0x2000, 0x7800100a, &(0x7f0000ffb000/0x2000)=nil) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f00000000c0)=0xfa) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000000080)=""/57) 05:55:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:50 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:50 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x5) fsetxattr$security_capability(r0, &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v2={0x2000000, [{0x8b4, 0x70}, {0xb6, 0xeba}]}, 0x14, 0x3) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:50 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000080)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@initdev, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) r3 = getuid() setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast2, @in=@multicast2, 0x4e20, 0x1d7, 0x4e21, 0x82, 0x2, 0xa0, 0x80, 0x1d, r2, r3}, {0x99e, 0x7f, 0x7, 0x9, 0x6, 0x1, 0x2, 0x2}, {0x80000000, 0x66de, 0x59083134, 0xfff}, 0x5, 0x6e6bb4, 0x1, 0x1, 0x1, 0x3}, {{@in=@multicast2, 0x4d3}, 0xa, @in=@broadcast, 0x0, 0x1, 0x2, 0xf9e, 0x6a9, 0xfff, 0x80000000}}, 0xe8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) epoll_create(0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r4, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:50 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:51 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000040)={r0, 0x1, 0x7, r0}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) [ 904.354400] IPVS: ftp: loaded support on port[0] = 21 05:55:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:51 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @remote}, 0x1000, 0x1, 0x0, 0x4, 0x6, 0x7}, 0x20) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:51 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 904.774197] net_ratelimit: 20 callbacks suppressed [ 904.774245] protocol 88fb is buggy, dev hsr_slave_0 [ 904.785006] protocol 88fb is buggy, dev hsr_slave_1 [ 905.014111] protocol 88fb is buggy, dev hsr_slave_0 [ 905.019248] protocol 88fb is buggy, dev hsr_slave_1 [ 905.254636] protocol 88fb is buggy, dev hsr_slave_0 [ 905.260566] protocol 88fb is buggy, dev hsr_slave_1 [ 905.267283] protocol 88fb is buggy, dev hsr_slave_0 [ 905.272847] protocol 88fb is buggy, dev hsr_slave_1 [ 905.278685] protocol 88fb is buggy, dev hsr_slave_0 [ 905.283938] protocol 88fb is buggy, dev hsr_slave_1 [ 905.978603] chnl_net:caif_netlink_parms(): no params data found [ 906.143122] bridge0: port 1(bridge_slave_0) entered blocking state [ 906.150511] bridge0: port 1(bridge_slave_0) entered disabled state [ 906.158174] device bridge_slave_0 entered promiscuous mode [ 906.290032] bridge0: port 2(bridge_slave_1) entered blocking state [ 906.296515] bridge0: port 2(bridge_slave_1) entered disabled state [ 906.303520] device bridge_slave_1 entered promiscuous mode [ 906.326971] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 906.337309] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 906.485608] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 906.495777] team0: Port device team_slave_0 added [ 906.501187] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 906.508675] team0: Port device team_slave_1 added [ 906.514002] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 906.657043] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 906.725738] device hsr_slave_0 entered promiscuous mode [ 906.784161] device hsr_slave_1 entered promiscuous mode [ 906.834628] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 906.976417] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 906.992642] bridge0: port 2(bridge_slave_1) entered blocking state [ 906.999023] bridge0: port 2(bridge_slave_1) entered forwarding state [ 907.005804] bridge0: port 1(bridge_slave_0) entered blocking state [ 907.012160] bridge0: port 1(bridge_slave_0) entered forwarding state [ 907.024774] bridge0: port 1(bridge_slave_0) entered disabled state [ 907.032671] bridge0: port 2(bridge_slave_1) entered disabled state [ 907.212039] 8021q: adding VLAN 0 to HW filter on device bond0 [ 907.220226] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 907.496545] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 907.506412] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 907.512530] 8021q: adding VLAN 0 to HW filter on device team0 [ 907.518892] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 907.526416] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 907.535097] device bridge_slave_1 left promiscuous mode [ 907.540587] bridge0: port 2(bridge_slave_1) entered disabled state [ 907.595129] device bridge_slave_0 left promiscuous mode [ 907.600678] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.254039] net_ratelimit: 18 callbacks suppressed [ 911.259032] protocol 88fb is buggy, dev hsr_slave_0 [ 911.264115] protocol 88fb is buggy, dev hsr_slave_1 [ 911.277063] device hsr_slave_1 left promiscuous mode [ 911.348482] device hsr_slave_0 left promiscuous mode [ 911.399688] team0 (unregistering): Port device team_slave_1 removed [ 911.411117] team0 (unregistering): Port device team_slave_0 removed [ 911.422859] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 911.460743] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 911.493988] protocol 88fb is buggy, dev hsr_slave_0 [ 911.499364] protocol 88fb is buggy, dev hsr_slave_1 [ 911.504503] protocol 88fb is buggy, dev hsr_slave_0 [ 911.509538] protocol 88fb is buggy, dev hsr_slave_1 [ 911.514640] protocol 88fb is buggy, dev hsr_slave_0 [ 911.519674] protocol 88fb is buggy, dev hsr_slave_1 [ 911.570550] bond0 (unregistering): Released all slaves [ 911.677827] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 911.685314] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 911.693203] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 911.701238] bridge0: port 1(bridge_slave_0) entered blocking state [ 911.707659] bridge0: port 1(bridge_slave_0) entered forwarding state [ 911.717825] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 911.726432] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 911.734714] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 911.742287] bridge0: port 2(bridge_slave_1) entered blocking state [ 911.748668] bridge0: port 2(bridge_slave_1) entered forwarding state [ 911.758295] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 911.766209] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 911.785231] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 911.792055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 911.802998] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 911.810946] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 911.819512] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 911.827364] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 911.830332] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 911.841442] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 911.852002] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 911.862523] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 911.872912] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 911.880972] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 911.889137] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 911.896777] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 911.904436] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 911.914165] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 911.920265] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 911.981232] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 912.002250] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 912.034036] protocol 88fb is buggy, dev hsr_slave_0 [ 912.039166] protocol 88fb is buggy, dev hsr_slave_1 05:55:59 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f0000000040)=""/13, &(0x7f0000000080)=0xd) epoll_create(0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0xffffffff, 0x338d, 0x2, 0x0, 0x1}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r2, &(0x7f0000000280)='#', 0x0}, 0x18) 05:55:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:59 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:55:59 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x2, 0x1}, 0x2c) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x0, 0x800) read$FUSE(r2, 0x0, 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x101, 0x4000) accept$inet(r3, &(0x7f0000000240)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0xfffffffffffffe25) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000140)={&(0x7f0000000040)=""/202, 0x20000, 0x800, 0x3ff}, 0x18) delete_module(&(0x7f00000001c0)='$bdevppp0\x00', 0x200) times(&(0x7f0000000180)) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r1, &(0x7f0000000280)='#', 0x0}, 0x18) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) pivot_root(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') write$FUSE_POLL(r3, &(0x7f0000000380)={0x18, 0x0, 0x8, {0x1}}, 0x18) 05:55:59 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f00000000c0)={'lapb0\x00', {0x2, 0x4e20, @multicast2}}) perf_event_open(0x0, r2, 0x0, r0, 0x1) fcntl$setown(r1, 0x8, r2) epoll_create(0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x4, 0x338d, 0x2, 0x0, 0x1}, 0x2c) setitimer(0x3, &(0x7f0000000040)={{0x77359400}, {0x77359400}}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000003c0)={r3, &(0x7f0000000280)='#', 0x0}, 0x18) r4 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f00000002c0)=0xe8) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000380)={@rand_addr, @rand_addr, 0x0}, &(0x7f0000000400)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@mcast2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000600)=0xe8) accept4$packet(r0, &(0x7f0000000640)={0x11, 0x0, 0x0}, &(0x7f0000000680)=0x14, 0x80000) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000940)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000900)={&(0x7f00000006c0)={0x224, r4, 0x0, 0x70bd27, 0x25dfdbfe, {}, [{{0x8, 0x1, r5}, {0x1b0, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9f62}}, {0x8}}}]}}, {{0x8, 0x1, r8}, {0x50, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x224}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) 05:55:59 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:55:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:55:59 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_buf(r1, 0x29, 0x30, &(0x7f0000000200)="c66abb079d5299756f8c7d545c503436fd7d7bcde8b7fb703e387340d1465bae8111bce2ead369d2852a4d30579939df4bb1f9d15096eb3d746aaa6ce789d4fc2824e13800d33ffa5c162d3d91750a49f80fceee26ecc3b58d4e4f3c876f2e385f14e7a411a22a2cb261c234cc9230b42cd48a411e41ef59fabf635049ab04b8c9f9ac2afac68ea539618ee4e284f79e", 0x90) mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) 05:56:00 executing program 4: 05:56:00 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:00 executing program 4: 05:56:00 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:00 executing program 4: 05:56:00 executing program 4: [ 914.326877] *** Guest State *** 05:56:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 914.374499] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 05:56:01 executing program 4: [ 914.476309] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:56:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 914.597109] CR3 = 0x0000000000000000 [ 914.654821] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 914.661159] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 914.724630] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 914.731796] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 914.788523] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.811556] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 914.843850] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.869848] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.898434] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 914.957830] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 915.014171] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 915.038814] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 915.059327] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 915.085173] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 915.105116] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 915.125340] Interruptibility = 00000000 ActivityState = 00000000 [ 915.143381] *** Host State *** [ 915.152144] RIP = 0xffffffff811f97e0 RSP = 0xffff888032657670 [ 915.171908] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 915.209652] FSBase=00007f718e5af700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 915.254103] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 915.260551] CR0=0000000080050033 CR3=00000000a78f5000 CR4=00000000001426f0 05:56:01 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0x40a85321, &(0x7f0000000080)={{}, 'port1\x00'}) 05:56:01 executing program 4: [ 915.299041] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 915.319121] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 915.419595] *** Control State *** [ 915.423398] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 915.514476] EntryControls=0000d1ff ExitControls=002fefff [ 915.520364] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 915.604334] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 915.611342] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 915.643708] reason=80000021 qualification=0000000000000000 [ 915.653190] IDTVectoring: info=00000000 errcode=00000000 [ 915.670802] TSC Offset = 0xfffffe141028c9f1 [ 915.682585] EPT pointer = 0x000000008dc4701e 05:56:02 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:02 executing program 4: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x202, 0x0) read(r0, 0x0, 0x0) 05:56:02 executing program 5: remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) 05:56:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x332d, &(0x7f0000000080)=0x0) io_cancel(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 05:56:02 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x294) connect$inet6(r0, &(0x7f0000000340), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) syz_execute_func(&(0x7f0000000280)="3666440f50f564ff0941c3c401f82ebd92823dcfc4c27d794e0066420fe2e3660fa041d288766d0000d3196f") setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, 0x0, 0x0) 05:56:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:03 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 916.533984] net_ratelimit: 24 callbacks suppressed [ 916.533991] protocol 88fb is buggy, dev hsr_slave_0 [ 916.544193] protocol 88fb is buggy, dev hsr_slave_1 05:56:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 917.260579] *** Guest State *** [ 917.288162] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 917.323612] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 917.351007] CR3 = 0x0000000000000000 05:56:04 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 917.379688] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 05:56:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:04 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 917.468896] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 917.493981] protocol 88fb is buggy, dev hsr_slave_0 [ 917.499563] protocol 88fb is buggy, dev hsr_slave_1 [ 917.549095] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 917.613158] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 917.675738] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 917.704896] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 917.713075] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:56:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 917.734633] protocol 88fb is buggy, dev hsr_slave_0 [ 917.740353] protocol 88fb is buggy, dev hsr_slave_1 [ 917.746269] protocol 88fb is buggy, dev hsr_slave_0 [ 917.751792] protocol 88fb is buggy, dev hsr_slave_1 [ 917.757455] protocol 88fb is buggy, dev hsr_slave_0 [ 917.762872] protocol 88fb is buggy, dev hsr_slave_1 [ 917.804131] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 917.877316] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 917.915540] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 917.955381] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 917.982754] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 918.018674] *** Guest State *** [ 918.026107] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 918.036429] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 918.051908] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 918.070652] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 918.095495] Interruptibility = 00000000 ActivityState = 00000000 [ 918.111166] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 918.121758] *** Host State *** [ 918.130358] RIP = 0xffffffff811f97e0 RSP = 0xffff88805c8af670 [ 918.236422] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 918.285927] CR3 = 0x0000000000000000 [ 918.297499] FSBase=00007f8353660700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 918.313081] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 05:56:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 918.344313] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 918.360443] CR0=0000000080050033 CR3=000000002d04e000 CR4=00000000001426f0 [ 918.374815] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 918.411227] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 918.422935] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 918.453704] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 918.466708] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 918.501316] *** Control State *** [ 918.521865] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 918.532803] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca 05:56:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 918.619654] EntryControls=0000d1ff ExitControls=002fefff [ 918.625671] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 918.660080] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 918.704038] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 918.722399] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 918.743705] VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 05:56:05 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 918.768439] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 918.781890] reason=80000021 qualification=0000000000000000 [ 918.824424] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 918.835696] IDTVectoring: info=00000000 errcode=00000000 [ 918.849053] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 918.865431] TSC Offset = 0xfffffe12841d5a09 [ 918.886539] EPT pointer = 0x000000002166401e [ 918.906043] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 05:56:05 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 918.944517] IDTR: limit=0x0000ffff, base=0x0000000000000000 05:56:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 919.034455] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 919.067748] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 919.107737] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 919.162407] Interruptibility = 00000000 ActivityState = 00000000 [ 919.188994] *** Host State *** [ 919.210548] RIP = 0xffffffff811f97e0 RSP = 0xffff88800fadf670 05:56:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 919.252929] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 919.288595] FSBase=00007fb587801700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 919.342966] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 919.381154] CR0=0000000080050033 CR3=000000003312f000 CR4=00000000001426f0 [ 919.434617] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 919.499591] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 919.524689] *** Control State *** [ 919.528428] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca 05:56:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 919.604420] EntryControls=0000d1ff ExitControls=002fefff [ 919.624687] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 919.684443] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 919.695129] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 05:56:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 919.746416] reason=80000021 qualification=0000000000000000 [ 919.805707] IDTVectoring: info=00000000 errcode=00000000 [ 919.837306] TSC Offset = 0xfffffe121686ab47 [ 919.841791] EPT pointer = 0x00000000a11fc01e 05:56:06 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:07 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:07 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:07 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:07 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:07 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 921.654011] net_ratelimit: 12 callbacks suppressed [ 921.654020] protocol 88fb is buggy, dev hsr_slave_0 [ 921.664160] protocol 88fb is buggy, dev hsr_slave_1 [ 921.895295] protocol 88fb is buggy, dev hsr_slave_0 [ 921.901541] protocol 88fb is buggy, dev hsr_slave_1 [ 921.907460] protocol 88fb is buggy, dev hsr_slave_0 [ 921.913279] protocol 88fb is buggy, dev hsr_slave_1 [ 921.919540] protocol 88fb is buggy, dev hsr_slave_0 [ 921.925243] protocol 88fb is buggy, dev hsr_slave_1 05:56:08 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:08 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:08 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 922.486627] *** Guest State *** 05:56:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 922.520047] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 05:56:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 922.586694] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 922.636633] CR3 = 0x0000000000000000 [ 922.650175] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 922.669280] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 922.682275] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 922.697154] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 922.747077] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 922.773991] protocol 88fb is buggy, dev hsr_slave_0 [ 922.779100] protocol 88fb is buggy, dev hsr_slave_1 05:56:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 922.805849] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 922.840462] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 922.876101] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 922.924652] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 922.960925] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 923.010339] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 923.056239] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 923.122895] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 923.204694] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 923.211272] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 05:56:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 923.384726] Interruptibility = 00000000 ActivityState = 00000000 [ 923.459301] *** Host State *** [ 923.462695] RIP = 0xffffffff811f97e0 RSP = 0xffff88805c677670 [ 923.484315] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 05:56:10 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 923.506739] FSBase=00007f9c53aeb700 GSBase=ffff8880ae600000 TRBase=fffffe0000003000 [ 923.544345] GDTBase=fffffe0000031000 IDTBase=fffffe0000000000 [ 923.550484] CR0=0000000080050033 CR3=000000008ec45000 CR4=00000000001426f0 05:56:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 923.600077] Sysenter RSP=fffffe0000002200 CS:RIP=0010:ffffffff88001360 [ 923.612692] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 923.635460] *** Control State *** 05:56:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 923.649165] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 923.719985] EntryControls=0000d1ff ExitControls=002fefff [ 923.747333] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 923.796577] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 05:56:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 923.853424] VMExit: intr_info=80000306 errcode=00000000 ilen=00000005 [ 923.914703] reason=80000021 qualification=0000000000000000 [ 923.973366] IDTVectoring: info=00000000 errcode=00000000 [ 924.032683] TSC Offset = 0xfffffe0fb606f41f 05:56:10 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 924.077779] EPT pointer = 0x000000008bf6f01e 05:56:11 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:56:11 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:12 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:56:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:12 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 926.345236] *** Guest State *** [ 926.391691] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 926.474330] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:56:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 926.654653] CR3 = 0x0000000000000000 [ 926.658723] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 926.777943] RFLAGS=0x00000002 DR7 = 0x0000000000000400 05:56:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 926.884676] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 926.944685] net_ratelimit: 18 callbacks suppressed [ 926.944712] protocol 88fb is buggy, dev hsr_slave_0 [ 926.955333] protocol 88fb is buggy, dev hsr_slave_1 [ 926.984725] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 926.992866] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:56:13 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 927.092322] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 927.118867] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:56:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) fchmod(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 927.156438] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:56:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 927.256412] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 927.274795] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 927.282979] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 05:56:13 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 927.365138] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 927.401529] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 927.462019] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 927.534126] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 05:56:14 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 927.611669] Interruptibility = 00000000 ActivityState = 00000000 [ 927.697102] *** Host State *** [ 927.714319] RIP = 0xffffffff811f97e0 RSP = 0xffff888056567670 [ 927.785688] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 927.792565] FSBase=00007f9c53aca700 GSBase=ffff8880ae600000 TRBase=fffffe0000033000 [ 927.874435] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 927.893994] protocol 88fb is buggy, dev hsr_slave_0 [ 927.899153] protocol 88fb is buggy, dev hsr_slave_1 [ 927.917724] CR0=0000000080050033 CR3=0000000096959000 CR4=00000000001426f0 [ 927.954836] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 928.006271] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 928.044309] *** Control State *** [ 928.064303] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 928.074798] EntryControls=0000d1ff ExitControls=002fefff [ 928.080412] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 928.134005] protocol 88fb is buggy, dev hsr_slave_0 [ 928.139180] protocol 88fb is buggy, dev hsr_slave_1 [ 928.144333] protocol 88fb is buggy, dev hsr_slave_0 [ 928.149466] protocol 88fb is buggy, dev hsr_slave_1 [ 928.154674] protocol 88fb is buggy, dev hsr_slave_0 [ 928.159756] protocol 88fb is buggy, dev hsr_slave_1 [ 928.183265] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 928.191172] VMExit: intr_info=80000306 errcode=00000000 ilen=00000005 [ 928.199155] reason=80000021 qualification=0000000000000000 [ 928.212423] IDTVectoring: info=00000000 errcode=00000000 [ 928.220631] TSC Offset = 0xfffffe0daf4b2c8d [ 928.232404] EPT pointer = 0x00000000329fa01e 05:56:14 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:14 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:15 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:16 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 930.041637] *** Guest State *** 05:56:16 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(0xffffffffffffffff, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 930.071924] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 05:56:16 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 930.202049] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 [ 930.255876] CR3 = 0x0000000000000000 [ 930.259772] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 05:56:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 930.340415] RFLAGS=0x00000002 DR7 = 0x0000000000000400 [ 930.405418] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 930.434480] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 930.443010] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 930.492923] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 930.574332] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 930.607910] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 930.734003] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 930.784502] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 930.838187] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 [ 930.889059] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 930.934159] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 930.942173] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 931.044521] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 931.052294] Interruptibility = 00000000 ActivityState = 00000000 [ 931.077731] *** Host State *** [ 931.087134] RIP = 0xffffffff811f97e0 RSP = 0xffff88802bbaf670 05:56:17 executing program 3: close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) fchmod(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:17 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 931.106674] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 [ 931.134116] FSBase=00007f718e5d0700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 [ 931.187712] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 931.227127] CR0=0000000080050033 CR3=00000000885ba000 CR4=00000000001426e0 [ 931.314052] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 931.346199] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 931.361332] *** Control State *** [ 931.365199] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 931.378559] EntryControls=0000d1ff ExitControls=002fefff [ 931.403005] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 931.433303] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 05:56:18 executing program 1: close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 931.502077] VMExit: intr_info=00000000 errcode=00000000 ilen=00000003 [ 931.536334] reason=80000021 qualification=0000000000000000 [ 931.574910] IDTVectoring: info=00000000 errcode=00000000 [ 931.611170] TSC Offset = 0xfffffe0bb0a2df48 [ 931.630997] EPT pointer = 0x0000000090c2201e 05:56:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:18 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:18 executing program 1: close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 05:56:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 932.064021] net_ratelimit: 12 callbacks suppressed [ 932.064029] protocol 88fb is buggy, dev hsr_slave_0 [ 932.070002] *** Guest State *** [ 932.074153] protocol 88fb is buggy, dev hsr_slave_1 [ 932.217933] CR0: actual=0x0000000000000030, shadow=0x0000000060000010, gh_mask=fffffffffffffff7 [ 932.293986] protocol 88fb is buggy, dev hsr_slave_0 [ 932.299084] protocol 88fb is buggy, dev hsr_slave_1 [ 932.304295] protocol 88fb is buggy, dev hsr_slave_0 [ 932.309385] protocol 88fb is buggy, dev hsr_slave_1 [ 932.314567] protocol 88fb is buggy, dev hsr_slave_0 [ 932.319666] protocol 88fb is buggy, dev hsr_slave_1 [ 932.344112] CR4: actual=0x0000000000002040, shadow=0x0000000000000000, gh_mask=ffffffffffffe871 05:56:19 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 932.415625] CR3 = 0x0000000000000000 [ 932.454286] RSP = 0x0000000000000f80 RIP = 0x0000000000000000 [ 932.469976] RFLAGS=0x00000002 DR7 = 0x0000000000000400 05:56:19 executing program 2: close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f00000004c0)=""/155) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:19 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 932.505094] Sysenter RSP=0000000000000000 CS:RIP=0000:0000000000000000 [ 932.512058] CS: sel=0x0000, attr=0x0009b, limit=0x0000ffff, base=0x0000000000000000 [ 932.752721] DS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 05:56:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 932.926468] SS: sel=0x0000, attr=0x00081, limit=0x0000ffff, base=0x0000000000000000 [ 933.011713] ES: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 933.070891] FS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 933.155899] GS: sel=0x0000, attr=0x00093, limit=0x0000ffff, base=0x0000000000000000 [ 933.176992] protocol 88fb is buggy, dev hsr_slave_0 [ 933.182925] protocol 88fb is buggy, dev hsr_slave_1 [ 933.244304] GDTR: limit=0x000007ff, base=0x0000000000001000 [ 933.291077] LDTR: sel=0x0008, attr=0x04082, limit=0x000007ff, base=0x0000000000001800 05:56:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 933.384384] IDTR: limit=0x0000ffff, base=0x0000000000000000 [ 933.414583] TR: sel=0x0000, attr=0x0008b, limit=0x0000ffff, base=0x0000000000000000 [ 933.451918] EFER = 0x0000000000000000 PAT = 0x0007040600070406 [ 933.541681] DebugCtl = 0x0000000000000000 DebugExceptions = 0x0000000000000000 [ 933.636454] Interruptibility = 00000000 ActivityState = 00000000 [ 933.680832] *** Host State *** [ 933.715167] RIP = 0xffffffff811f97e0 RSP = 0xffff88802bbaf670 [ 933.751326] CS=0010 SS=0018 DS=0000 ES=0000 FS=0000 GS=0000 TR=0040 05:56:20 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 933.829575] FSBase=00007f718e5d0700 GSBase=ffff8880ae700000 TRBase=fffffe0000003000 05:56:20 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 933.911627] GDTBase=fffffe0000001000 IDTBase=fffffe0000000000 [ 933.975400] CR0=0000000080050033 CR3=0000000091d3d000 CR4=00000000001426e0 [ 934.024181] Sysenter RSP=fffffe0000032200 CS:RIP=0010:ffffffff88001360 [ 934.114003] EFER = 0x0000000000000d01 PAT = 0x0407050600070106 [ 934.164289] *** Control State *** [ 934.224424] PinBased=0000003f CPUBased=b5986dfa SecondaryExec=000000ca [ 934.263250] EntryControls=0000d1ff ExitControls=002fefff [ 934.324025] ExceptionBitmap=00060042 PFECmask=00000000 PFECmatch=00000000 [ 934.331017] VMEntry: intr_info=00000000 errcode=00000000 ilen=00000000 [ 934.374634] VMExit: intr_info=00000000 errcode=00000000 ilen=00000002 [ 934.381357] reason=80000021 qualification=0000000000000000 [ 934.440339] IDTVectoring: info=00000000 errcode=00000000 [ 934.485342] TSC Offset = 0xfffffe0a94daba3c [ 934.521905] EPT pointer = 0x000000005742401e 05:56:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:21 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:22 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:22 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:22 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:23 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:23 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:23 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 937.345052] net_ratelimit: 18 callbacks suppressed [ 937.345095] protocol 88fb is buggy, dev hsr_slave_0 [ 937.356017] protocol 88fb is buggy, dev hsr_slave_1 05:56:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 05:56:24 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:24 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:24 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x0, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) [ 938.294310] protocol 88fb is buggy, dev hsr_slave_0 [ 938.299469] protocol 88fb is buggy, dev hsr_slave_1 05:56:25 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) 05:56:25 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:25 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) [ 938.534115] protocol 88fb is buggy, dev hsr_slave_0 [ 938.539304] protocol 88fb is buggy, dev hsr_slave_1 [ 938.544512] protocol 88fb is buggy, dev hsr_slave_0 [ 938.549630] protocol 88fb is buggy, dev hsr_slave_1 [ 938.554824] protocol 88fb is buggy, dev hsr_slave_0 [ 938.560022] protocol 88fb is buggy, dev hsr_slave_1 05:56:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) close(r0) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x9, &(0x7f00000008c0)=[0x0, 0xee01, 0x0, 0xee00, 0xee01, 0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) syz_open_dev$sndctrl(&(0x7f00000001c0)='/dev/snd/controlC#\x00', 0x0, 0x0) 05:56:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x88912, 0x0) getpeername(r0, &(0x7f0000000580)=@generic, &(0x7f0000000040)=0x80) accept$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0xffe7) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, 0x0, 0x10000, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000200)={'raw\x00'}, &(0x7f0000000280)=0x54) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f00000004c0)=""/155) r3 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, 0x0, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000000)={0x0, 0x200, 0xff}) getgroups(0x7, 0x0) getresgid(0x0, 0x0, &(0x7f00000007c0)) getgroups(0x0, 0x0) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe4000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, &(0x7f0000000400)="66b9800000c00f326635000400000f300fc71e4425749e66b8eab9ffdd0f23d80f21f86635400000100f23f866b8ef6700000f23c00f21f8663501000f000f23f866b9860b000066b80300000066ba000000000f306666660fd5ef66b8ca9300000f23d00f21f86635100000010f23f8ba6100ec66b80d0000000f23d00f21f866351000000e0f23f8", 0x89}], 0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) dup3(0xffffffffffffffff, r2, 0x0) fchmod(r1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000680)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) clone(0x4, 0x0, 0xfffffffffffffffe, &(0x7f0000000a80), 0xffffffffffffffff) [ 939.230539] WARNING: CPU: 0 PID: 8304 at arch/x86/kvm/mmu.c:830 mmu_spte_clear_track_bits+0x43a/0x500 [ 939.241564] Kernel panic - not syncing: panic_on_warn set ... [ 939.247469] CPU: 0 PID: 8304 Comm: syz-executor1 Not tainted 4.20.0+ #8 [ 939.254239] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 939.263266] kobject: 'kvm' (00000000bfbeb680): kobject_uevent_env [ 939.263624] Call Trace: [ 939.272470] dump_stack+0x1db/0x2d0 [ 939.276153] ? dump_stack_print_info.cold+0x20/0x20 [ 939.281196] ? mmu_spte_clear_track_bits+0x380/0x500 [ 939.286345] panic+0x2cb/0x589 [ 939.289559] ? add_taint.cold+0x16/0x16 [ 939.293750] ? mmu_spte_clear_track_bits+0x43a/0x500 [ 939.298917] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.304520] ? __probe_kernel_read+0x1f4/0x250 [ 939.309129] ? __warn.cold+0x5/0x4b [ 939.312785] ? mmu_spte_clear_track_bits+0x43a/0x500 [ 939.313504] kobject: 'kvm' (00000000bfbeb680): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 939.317922] __warn.cold+0x20/0x4b [ 939.317941] ? mmu_spte_clear_track_bits+0x43a/0x500 [ 939.317956] report_bug+0x263/0x2b0 [ 939.317976] do_error_trap+0x11b/0x200 [ 939.317997] do_invalid_op+0x37/0x50 [ 939.318011] ? mmu_spte_clear_track_bits+0x43a/0x500 [ 939.318026] invalid_op+0x14/0x20 [ 939.318044] RIP: 0010:mmu_spte_clear_track_bits+0x43a/0x500 [ 939.318061] Code: 45 89 67 90 31 ff 44 89 e6 48 ba 00 00 00 00 00 fc ff df c6 04 10 f8 e8 24 d1 70 00 45 85 e4 0f 85 74 fd ff ff e8 96 cf 70 00 <0f> 0b e9 68 fd ff ff e8 8a cf 70 00 4c 89 f7 e8 a2 24 f7 ff 31 f6 [ 939.318072] RSP: 0018:ffff8880163970e0 EFLAGS: 00010246 [ 939.385552] RAX: 0000000000040000 RBX: 400000002396cc77 RCX: ffffc90007fea000 [ 939.392835] RDX: 0000000000040000 RSI: ffffffff811125ba RDI: 0000000000000005 [ 939.400113] RBP: ffff8880163971b8 R08: ffff88808a7e4100 R09: fffff9400011cb67 [ 939.407395] R10: fffff9400011cb66 R11: ffffea00008e5b37 R12: 0000000000000000 [ 939.414809] R13: 1ffff11002c72e1e R14: 000000000002396c R15: ffff888016397190 [ 939.422233] ? mmu_spte_clear_track_bits+0x43a/0x500 [ 939.427384] ? mmu_spte_update+0x330/0x330 [ 939.431642] ? __lock_acquire+0x572/0x4a30 [ 939.436939] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 939.442504] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 939.448084] ? __pte_list_remove+0x94/0x460 [ 939.452444] drop_spte+0x24/0x220 [ 939.455931] mmu_page_zap_pte+0x2e2/0x3b0 [ 939.460095] ? drop_spte+0x220/0x220 [ 939.463824] ? __lock_is_held+0xb6/0x140 [ 939.467917] kvm_mmu_prepare_zap_page+0x19d/0x1440 [ 939.472894] ? debug_check_no_obj_freed+0x2f8/0x588 [ 939.477925] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.483492] ? check_preemption_disabled+0x48/0x290 [ 939.488682] ? kvm_handle_hva_range+0x730/0x730 [ 939.493391] ? kvm_make_vcpus_request_mask+0x481/0x5a0 [ 939.499168] ? gfn_to_pfn_atomic+0x6c0/0x6c0 [ 939.503644] ? add_lock_to_list.isra.0+0x450/0x450 [ 939.508595] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.514163] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.519714] ? check_preemption_disabled+0x48/0x290 [ 939.524792] ? kvm_make_vcpus_request_mask+0x5a0/0x5a0 [ 939.530114] kvm_mmu_invalidate_zap_all_pages+0x53e/0x710 [ 939.535679] ? kvm_mmu_zap_collapsible_sptes+0x830/0x830 [ 939.541153] ? lock_release+0xc40/0xc40 [ 939.545256] ? rcu_sync_dtor+0x170/0x170 [ 939.549371] kvm_arch_flush_shadow_all+0x16/0x20 [ 939.554149] kvm_mmu_notifier_release+0x5c/0x90 [ 939.559007] ? kvm_vcpu_on_spin+0x800/0x800 [ 939.563343] mmu_notifier_unregister+0x1dd/0x5e0 [ 939.568113] ? kvm_vcpu_on_spin+0x800/0x800 [ 939.572474] ? __mmu_notifier_register+0x30/0x30 [ 939.577287] ? free_pages+0x46/0x50 [ 939.580939] kvm_put_kvm+0x6aa/0xff0 [ 939.584680] ? kvm_write_guest_cached+0x40/0x40 [ 939.589366] ? ima_file_free+0x128/0x630 [ 939.593472] ? debugfs_remove+0x130/0x130 [ 939.597660] kvm_vcpu_release+0x7b/0xa0 [ 939.601659] __fput+0x3c5/0xb10 [ 939.604989] ? kvm_vm_release+0x60/0x60 [ 939.609013] ? get_max_files+0x20/0x20 [ 939.612944] ? task_work_run+0x1bb/0x2b0 [ 939.617044] ? trace_hardirqs_off_caller+0x300/0x300 [ 939.622165] ? do_raw_spin_trylock+0x270/0x270 [ 939.626770] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 939.632496] ____fput+0x16/0x20 [ 939.635795] task_work_run+0x1f4/0x2b0 [ 939.639724] ? task_work_cancel+0x2c0/0x2c0 [ 939.644092] ? kvm_vcpu_ioctl+0x747/0x12d0 [ 939.648372] get_signal+0x168d/0x19b0 [ 939.652219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.657785] ? lock_downgrade+0x910/0x910 [ 939.661949] ? kasan_check_read+0x11/0x20 [ 939.666109] ? ptrace_notify+0x130/0x130 [ 939.670219] ? rcu_read_unlock_special+0x380/0x380 [ 939.675177] ? __fget+0x499/0x710 [ 939.678680] do_signal+0x91/0x1e80 [ 939.682241] ? iterate_fd+0x4b0/0x4b0 [ 939.686051] ? lock_release+0xc40/0xc40 [ 939.690042] ? kvm_vcpu_block+0x1010/0x1010 [ 939.694399] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 939.699950] ? do_vfs_ioctl+0x11e/0x17d0 [ 939.704059] ? setup_sigcontext+0x7d0/0x7d0 [ 939.708401] ? check_preemption_disabled+0x48/0x290 [ 939.713433] ? exit_to_usermode_loop+0x98/0x3b0 [ 939.718138] ? exit_to_usermode_loop+0x98/0x3b0 [ 939.722815] ? lockdep_hardirqs_on+0x415/0x5d0 [ 939.727419] ? trace_hardirqs_on+0xbd/0x310 [ 939.731754] ? do_syscall_64+0x696/0x800 [ 939.735822] ? trace_hardirqs_off_caller+0x300/0x300 [ 939.740933] ? cpumask_weight.constprop.0+0x3f/0x3f [ 939.745955] ? do_syscall_64+0x8c/0x800 [ 939.749953] exit_to_usermode_loop+0x2f7/0x3b0 [ 939.754562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.760050] ? syscall_trace_enter+0x12a0/0x12a0 [ 939.764813] ? ksys_ioctl+0x82/0xd0 [ 939.768468] do_syscall_64+0x696/0x800 [ 939.772371] ? syscall_return_slowpath+0x5f0/0x5f0 [ 939.777322] ? prepare_exit_to_usermode+0x232/0x3b0 [ 939.782364] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 939.787223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 939.792434] RIP: 0033:0x457ec9 [ 939.795656] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 939.814581] RSP: 002b:00007f835365fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 939.822316] RAX: fffffffffffffffc RBX: 0000000000000003 RCX: 0000000000457ec9 [ 939.829610] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 939.836897] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 939.844187] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f83536606d4 [ 939.851493] R13: 00000000004c0e36 R14: 00000000004d2758 R15: 00000000ffffffff [ 939.860735] Kernel Offset: disabled [ 939.865052] Rebooting in 86400 seconds..