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", 0x1000}, {&(0x7f0000000940)="01bd3c44cfcb3f6d2b0b1b727808b99cd35cfbbc1c523f76ba72b2b9f4928ccd30fe46adf12327e8066a5e9ad5", 0x2d}, {&(0x7f0000000980)="46c1f27ed790324a209ca275f3c8a9f465a009b231d9090de9e20bb49165933e0ffc4e0a25f886b7ebfe47e55257cfb233178c008a496f0e5af313ecb70c8c4da0c10af20f5219539d9cb301e4feb5441119cc8791596b770610efc5ff78d13829ab646efd3e29af426577f41ca9dc6d1e4e", 0x72}, {&(0x7f0000000a00)="e6eff7f077f8", 0x6}, {&(0x7f0000000a40)="47e3fee0683a21ab1eea84b35d598a057262fe08d1418474bb250ce6e91c64e7d9b72bd30b18f6a9aeca", 0x2a}, {&(0x7f00000033c0)="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", 0x1000}, {&(0x7f0000000a80)="21eda0", 0x3}, {&(0x7f0000000ac0)="877584f4a217ec1b58870e60652c0ae05aab6ce0fc9fdb9f99e825c90874c3b31a9b23f678ae95adb7d6a61ed141add2f1a4f07844dcd28230d76dcb95ad5757d229930ebbccf9fb84a6a49859372eeb0f40cff5c573ab70044b2a17e5a6f0d810d36af2ee38b5ae969c15e62f99d03dd2bd224d0d626f6772579f6bd329e6d74ff29086f72547b49296deff72323ec5b7f7bc6f5b0f13e79b0757ad4e79667a9fb8b187f46f52b3834e2eddf3aaa799e4a77e7d786251232c0fb088fd102964a3c21fb30b4856cba028516a6821fb", 0xcf}], 0x8, &(0x7f0000000c40)=[@mark={{0x14, 0x1, 0x24, 0x81}}, @mark={{0x14, 0x1, 0x24, 0x80}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @mark={{0x14, 0x1, 0x24, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0xa000000000000000}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18}}], 0xc0}}, {{0x0, 0x0, &(0x7f0000000d00), 0x0, &(0x7f0000000d40)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x18}}, {{0x0, 0x0, &(0x7f0000000dc0)=[{&(0x7f0000000d80)}], 0x1}}], 0x5, 0x40000) preadv(r0, &(0x7f0000000480), 0x1000000000000237, 0x0) r2 = geteuid() getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000140)={{{@in=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000040)=0xe8) setreuid(r2, r3) [ 193.539596][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.558376][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.576139][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.597181][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.613261][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.621824][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 193.630356][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 193.639631][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 193.648180][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 193.656889][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 193.665452][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.674111][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.684798][ T9231] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.709494][ T9237] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 193.723207][ T9237] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 193.737397][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.745802][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 193.753787][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.762693][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.824886][ T9246] device hsr_slave_0 entered promiscuous mode [ 193.891175][ T9246] device hsr_slave_1 entered promiscuous mode [ 193.931016][ T9246] debugfs: Directory 'hsr0' with parent '/' already present! [ 193.978847][ T9234] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.027366][ T9237] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.043034][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.059361][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.098115][ T9234] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.118908][ T9231] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.141371][ T9242] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.233780][ T9242] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.257660][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.265991][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.306991][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.339821][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.378463][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.385706][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.404360][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.420495][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready 23:17:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)="8f6e", 0x2, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) 23:17:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000080)={'veth1_to_team\x00', 0x40d}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000040)={'bridge_slave_1\x00', 0x200}) 23:17:20 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) poll(&(0x7f0000000240)=[{r0}], 0x1, 0x800000000004b) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x24f, 0x0, 0x0, 0x800e004de) r2 = socket$inet_udplite(0x2, 0x2, 0x88) dup(r0) recvfrom$inet(r2, 0x0, 0xa2, 0x0, 0x0, 0x800e004e1) shutdown(r1, 0x0) shutdown(r2, 0x0) [ 194.446315][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.453535][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.534111][ T9246] 8021q: adding VLAN 0 to HW filter on device bond0 [ 194.555827][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.572168][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.590535][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.610289][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 194.627480][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 194.661963][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 194.672619][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 194.683457][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 194.692296][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 194.701189][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 194.709427][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 194.718188][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 194.747162][ T9242] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 194.777075][ T9242] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 194.789846][ T9246] 8021q: adding VLAN 0 to HW filter on device team0 [ 194.809370][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 194.818099][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 194.833746][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 194.844349][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 194.852933][ T2823] bridge0: port 1(bridge_slave_0) entered blocking state [ 194.859970][ T2823] bridge0: port 1(bridge_slave_0) entered forwarding state [ 194.867996][ T2823] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 194.897242][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 194.906282][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 194.914984][ T9238] bridge0: port 2(bridge_slave_1) entered blocking state [ 194.922068][ T9238] bridge0: port 2(bridge_slave_1) entered forwarding state [ 194.936601][ T9242] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 194.947465][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 194.983188][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 194.992888][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 195.002111][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 195.014011][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 195.023662][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 195.036485][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 195.048371][ T3011] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 195.065527][ T9246] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 195.077670][ T9246] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 195.091202][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 195.099616][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 195.111659][ T9238] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 195.142462][ T9246] 8021q: adding VLAN 0 to HW filter on device batadv0 23:17:21 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tracefs\x00', 0x0, 0x0) stat(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000980)) 23:17:21 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$EVIOCGUNIQ(r1, 0x80404508, 0x0) 23:17:21 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 23:17:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)="8f6e", 0x2, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) 23:17:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)="8f6e", 0x2, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) 23:17:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f00000000c0)={@loopback, @broadcast, r1}, 0xc) [ 195.472235][ T9332] input: syz1 as /devices/virtual/input/input5 [ 195.523765][ T9328] input: syz1 as /devices/virtual/input/input6 23:17:21 executing program 5: sendmmsg(0xffffffffffffffff, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0, 0x263}, {0x0}, {&(0x7f0000000340)="3a88534a97a8762a515dec93baf4a98161978016df6ec750ae029bc63789b59ee60ceccefa40735c25107d52d18753b4bc561d382db5fa9b1390c0a64f7b4e33e1a4131c48b5acee0e0aba3093af5ec45dd5c0ecf516dd1bb340d0bde4794e1392eae89f3612b0e10096c79414a50ccd3624bac5dfa0133f99ebb6a40afc17d30e516961", 0x5f}], 0x2, 0x0, 0xffffffffffffff9e}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x9, r0, 0x0, 0x0) 23:17:21 executing program 4: setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) 23:17:21 executing program 3: fcntl$getown(0xffffffffffffff9c, 0x9) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000140)) r0 = syz_open_procfs(0x0, 0x0) readahead(r0, 0xfffffffffffffffc, 0x3) sendmsg(0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3) arch_prctl$ARCH_GET_CPUID(0x1011) preadv(0xffffffffffffffff, &(0x7f00000017c0), 0x1fe, 0x0) sigaltstack(&(0x7f0000ffb000/0x2000)=nil, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) close(r1) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'mangle\x00'}, &(0x7f00000005c0)=0x54) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x800002, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000080)={'team_slave_1\x00', 0x4fff}) r3 = socket$nl_route(0x10, 0x3, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x7, @empty, 0x81}, 0x1c) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x2007fff) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f00000001c0), 0xfffffef3) ioctl$FIGETBSZ(r2, 0x2, &(0x7f00000000c0)) read(r5, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r1, r4, &(0x7f0000d83ff8), 0x8000fffffffe) 23:17:21 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r2, 0x2081fd) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x2, &(0x7f0000000000)=0x0) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000), 0x10000}]) [ 195.683400][ T9336] input: syz1 as /devices/virtual/input/input7 23:17:21 executing program 5: pipe(0x0) ioctl$KDGETLED(0xffffffffffffffff, 0x4b31, 0x0) semget(0x1, 0x0, 0x780) 23:17:21 executing program 1: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) r1 = gettid() write$P9_RWRITE(0xffffffffffffffff, 0x0, 0xca) fcntl$setown(r0, 0x8, r1) 23:17:21 executing program 4: prctl$PR_SET_FP_MODE(0x2d, 0x0) prctl$PR_SET_FPEXC(0xc, 0x0) ptrace$peek(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getpid() prctl$PR_SET_FPEXC(0xc, 0x80) r0 = timerfd_create(0x3, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000040)=0x7c6b) r1 = semget$private(0x0, 0x3, 0x0) semctl$GETVAL(r1, 0x3, 0xc, &(0x7f0000000080)=""/247) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r2, &(0x7f0000001880)={0x0, 0x0, &(0x7f00000017c0)=[{0x0}, {0x0}], 0x2}, 0x40000) ioctl$FICLONE(r0, 0x40049409, r0) r3 = perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000001940)='@\x00') fcntl$F_SET_FILE_RW_HINT(r3, 0x40e, &(0x7f0000001980)=0x7) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000001a00)=0x11) fchmod(r2, 0x0) 23:17:21 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00\x00\x00\x00\x00\x00\xef\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000080)={r1, 0x2, 0x6, @remote}, 0x352) [ 196.032518][ T9361] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 196.041074][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 196.047102][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:17:21 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000540), 0x7d63e930) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) prctl$PR_SET_SECCOMP(0x16, 0x8000000400, 0x0) fstat(0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f00000006c0)) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000800)={{}, {0x0, @local}, 0x34, {0x2, 0x0, @broadcast}, 'bridge_slave_0\x00'}) clock_gettime(0x0, 0x0) read(r0, &(0x7f0000000200)=""/250, 0xfffffea0) rename(0x0, &(0x7f00000003c0)='./file0\x00') r2 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x400200007fd, &(0x7f0000000000)={0x2, 0x4e23, @loopback}, 0x10) epoll_wait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x5) write(r0, &(0x7f0000000380), 0x0) getpeername$netlink(0xffffffffffffffff, 0x0, &(0x7f0000000340)) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x3, 0x0, 0x100000001}) write$binfmt_elf64(r2, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) sync() recvmsg(r2, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) sched_rr_get_interval(0x0, 0x0) 23:17:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x8, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="850000006100000054000000000000009500000000000000d882a746f2a256bde892fe4fee5051175783e7075f67de3b0d9f7076d3ac6fb6631476"], &(0x7f0000281ffc)='G\xffL\x00'}, 0x48) 23:17:21 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) flistxattr(0xffffffffffffffff, 0x0, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f00000002c0)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)) r1 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) dup2(r0, r1) execve(&(0x7f00000000c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f00000001c0)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) ioctl$TIOCGLCKTRMIOS(r1, 0x5456, 0x0) [ 196.103087][ T9361] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 23:17:21 executing program 4: clone(0x8000100000203, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000f80000)='./file0\x00', 0x1040, 0x0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200010a) close(r0) execve(&(0x7f0000000100)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) clone(0x3103101ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1\x00', 0x0, 0x0) write$P9_RGETATTR(r0, &(0x7f0000000280)={0xa0}, 0xa0) [ 196.201053][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 196.201495][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 196.206874][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 196.212611][ C0] protocol 88fb is buggy, dev hsr_slave_1 23:17:22 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, 0x0, 0x0) [ 196.381537][ T9361] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 23:17:22 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x50000}]}) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RFSYNC(r0, 0x0, 0x0) [ 196.709669][ T9361] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 196.811081][ T9361] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. 23:17:22 executing program 3: 23:17:22 executing program 5: r0 = eventfd2(0x0, 0x0) fcntl$getflags(0xffffffffffffffff, 0x0) syncfs(r0) 23:17:22 executing program 4: r0 = add_key(&(0x7f0000000040)='ceph\x00', &(0x7f0000000080)={'syz', 0x0}, &(0x7f00000000c0)="f67dd878d78acfc1ddcfebb8acd849cd561cdcee331749decf49dab2e8b3e602ec9e26a4c350dc0ec7c49663af46d8a88e41bc5df8ffa6bdb7487bb64d1a5f", 0x3f, 0x0) keyctl$read(0xb, r0, &(0x7f00000001c0)=""/210, 0xd2) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000340)) r1 = creat(&(0x7f0000000480)='./file0\x00', 0x80) ioctl$TIOCLINUX7(0xffffffffffffffff, 0x541c, 0x0) semop(0x0, 0x0, 0x0) keyctl$get_security(0x11, 0x0, 0x0, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f00000005c0)={0x0, 0x81, 0x4d}) write$P9_RSYMLINK(r1, 0x0, 0x0) semget$private(0x0, 0x0, 0x400) mount(0x0, 0x0, &(0x7f00000006c0)='iso9660\x00', 0x988000, &(0x7f0000000700)='syz') ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000840)) removexattr(0x0, 0x0) keyctl$read(0xb, r0, 0x0, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x13) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000009c0)={'erspan0\x00', 0x2000}) sigaltstack(&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000a00)) 23:17:22 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ifreq(r1, 0x8922, &(0x7f0000000080)={'eql\x00', @ifru_ivalue=0x10e8}) 23:17:22 executing program 3: 23:17:22 executing program 1: 23:17:23 executing program 0: 23:17:23 executing program 5: 23:17:23 executing program 4: 23:17:23 executing program 3: 23:17:23 executing program 2: 23:17:23 executing program 1: 23:17:23 executing program 2: 23:17:23 executing program 3: 23:17:23 executing program 5: 23:17:23 executing program 0: 23:17:23 executing program 4: 23:17:23 executing program 2: 23:17:23 executing program 4: 23:17:23 executing program 1: 23:17:23 executing program 5: 23:17:23 executing program 3: 23:17:23 executing program 0: 23:17:23 executing program 2: 23:17:23 executing program 4: 23:17:23 executing program 3: 23:17:23 executing program 5: 23:17:23 executing program 1: 23:17:23 executing program 4: 23:17:23 executing program 0: 23:17:23 executing program 2: 23:17:23 executing program 5: 23:17:23 executing program 3: 23:17:23 executing program 1: 23:17:24 executing program 4: 23:17:24 executing program 2: 23:17:24 executing program 0: 23:17:24 executing program 1: 23:17:24 executing program 5: 23:17:24 executing program 4: 23:17:24 executing program 3: 23:17:24 executing program 1: 23:17:24 executing program 2: 23:17:24 executing program 0: 23:17:24 executing program 3: 23:17:24 executing program 5: 23:17:24 executing program 4: 23:17:24 executing program 2: 23:17:24 executing program 0: 23:17:24 executing program 1: 23:17:24 executing program 5: 23:17:24 executing program 3: 23:17:24 executing program 4: 23:17:24 executing program 0: 23:17:24 executing program 2: 23:17:24 executing program 1: 23:17:24 executing program 3: 23:17:24 executing program 5: 23:17:24 executing program 4: 23:17:25 executing program 0: 23:17:25 executing program 1: 23:17:25 executing program 3: 23:17:25 executing program 2: 23:17:25 executing program 4: r0 = socket$inet(0x10, 0x2000000000000002, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) sendmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2f0000001d0005c5ffffff000d0000000200001f01000000000002c9130001000000000050800000d18e1092e0c875", 0x2f}], 0x1}, 0x0) 23:17:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCPKT(r0, 0x5420, 0xffffffffffffffff) 23:17:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)="8f6e", 0x2, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 23:17:25 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'veth0_to_bond\x00', &(0x7f0000000140)=@ethtool_cmd={0x8}}) 23:17:25 executing program 2: ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, &(0x7f0000000600)={0x44, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="006340404b8afe18d0e37b2f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000771afc8d7d63c538abb7a356430dfc08ee1fde627ff4cb3292d44fecebb3a8d351bcf39a71990c50282f1d9513f0964999a6f3227f1a052626125faea459ef76496a0b0591ac3d2e2ba27b385e2316702b9853dd6ea36516762fd7fb6f08dc696edc51739d817ee6056cc9aad856e005184783a11169adc7aa24ff7c66dff5b6b3690092c20a5505ed1c8a9747560b9f7341bd2e4860cc38f33fa7c82cb8c79da0c49b2f9a3c88caa807eca63f65589bb7eb444e017bbe526cca38f200c1d3f0fd0f4f09cb55565713ed0622031fb3c00b84dbf6a104c0070416d48ed9a5a8bc9b71e648679db2e5b82897ae343066f9"], 0x0, 0x0, 0x0}) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'system.', 'eth1Z+\x00'}, &(0x7f0000000080)=""/123, 0x7b) 23:17:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2803) fdatasync(r1) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000000080)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x1b) ioctl$TCFLSH(r0, 0x540b, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000100)="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") 23:17:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000040)='lotrusted\x1a\x00', 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) 23:17:25 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) getsockopt$bt_BT_CHANNEL_POLICY(r0, 0x112, 0xa, &(0x7f0000000080)=0x61558bad, &(0x7f00000000c0)=0x4) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000000)={0x0, 0x1ffe, 0x800, 0xfffffffffffff880}, 0x18) 23:17:25 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0xd, 0x7, 0x2000}, 0x4) openat$null(0xffffffffffffff9c, 0x0, 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x4a, 0x6f, 0x0, {0x5, [{0x10, 0x0, 0x3}, {0x80, 0x2, 0x4}, {0x0, 0x3}, {0x3c, 0x0, 0x3}, {0x4}]}}, 0x4a) ioctl$TIOCSTI(r0, 0x5412, 0xfffffffffffffff9) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) [ 199.924032][ C0] hrtimer: interrupt took 30533 ns 23:17:25 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = add_key(&(0x7f0000000000)='rxrpc_s\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="8d04ba357f857e2ff5d7a20e421992be5f43e4c2fb0a783afaa69a09160c4e", 0x1f, 0xfffffffffffffffd) keyctl$describe(0x6, r2, &(0x7f00000002c0)=""/233, 0xe9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000200)=0x14) sendmmsg$sock(r1, &(0x7f0000007800)=[{{0x0, 0x0, &(0x7f00000036c0)=[{0x0}, {0x0}, {&(0x7f0000002380)="32141fba95f727dfd6ae9ea6713d684007dabbba6f5198d315caaa004dddcf891087839d19c2db1bc1dfe0c71743c2fd789fd9dad857265321ca55d09d38bcc70ef8a4d41f200a8659ff609ccfb6c6bc9ab084", 0x53}, {0x0}, {&(0x7f0000002440)}, {&(0x7f0000002500)="599a8661da2dd77ec4b44715a3232bf5675864ce91b875cb1b1b892d730cc05c3dbd82c24660c10786186e362c41756e78304971d7ec5e8be2e669a91c95358827ca1600de7694705733630a1d96ab3ee1b25f5c60b2e049b51f5656cc281ab805681b2fb5ed465ba321e10342a12f2b58c73b79dba06aa7695eb9a95b65cc9bb9278291f740e7c5bb3f1bf432c1ef749a2bf8f67b8f4bdd5211f6e77fd6100d8d7181fc4e6f7fdd9cf98b7cf370c49df1916a9d6e461d", 0xb7}, {&(0x7f00000025c0)}, {&(0x7f00000026c0)}], 0x8}}, {{&(0x7f00000039c0)=@llc={0x1a, 0x325, 0x0, 0x0, 0xfff, 0x7, @broadcast}, 0x80, &(0x7f0000004bc0)=[{&(0x7f0000003a40)}, {&(0x7f0000003a80)}, {0x0}], 0x3}}, {{&(0x7f0000004c00)=@ethernet={0x1, @remote}, 0x80, 0x0, 0x0, &(0x7f0000004e40)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}], 0x18}}, {{&(0x7f0000004e80)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x2, 0x3, 0x0, 0x3, {0xa, 0x4e23, 0x9d1, @mcast2, 0x80000001}}}, 0x80, 0x0, 0x0, &(0x7f0000005140)=[@txtime={{0x18}}], 0x18}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006e00)=[{&(0x7f00000059c0)="9af2bacbdb30094407333634db0c5b9def72d70d8a7224033ad69e9f439a5ca04d", 0x21}, {0x0}, {0x0}, {&(0x7f0000005d00)}, {&(0x7f0000006d00)}], 0x5}}, {{&(0x7f00000071c0)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'morus640-generic\x00'}, 0x80, 0x0}}], 0x7, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000001340)) dup2(r0, r3) 23:17:25 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x10000000, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) kcmp(r1, r2, 0x2, r0, r0) r3 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x0, 0x1) ioctl$KVM_CREATE_VM(r3, 0xae01, 0x0) ioctl(r0, 0x7fffffffffffffb9, &(0x7f0000000240)) 23:17:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x0, 0x300) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0xb0101, 0x0) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000080)={0x11, 0x34, 0x14, 0x4, 0x5, 0x223, 0x5, 0x152, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0x3cf0ffff}, {0x80000006}]}, 0x10) 23:17:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x2a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000040)="8f6e", 0x2, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000005d00)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000080)=""/148, 0xff1e}], 0x1}}, {{0x0, 0xffffffffffffffcd, 0x0}}], 0x40001de, 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) 23:17:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100)="d6079d4763fdd111c855faf23430bb07224b1422d592dfb74fd25cbb53f1a6a9695c26e8f55513a0e0ed71c5169db9d7edd904685a7f9d7534f47012db155deb986e44f64cbd18dac3200d069da07a30b73f688c3528c8815d6dd71463eff79a7d7f", 0x62, 0xfffffffffffffff8) r4 = add_key(&(0x7f0000000180)='cifs.idmap\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="05632ea84163d665187d2d400868290b63010c8f1c5fa968ca655fdbf07cbb67fd03dc716480718b60879a25d357fe53442739377613f1a2f2aeb708b7faca2b10132956286f44dabafde75bb0a291ba96101e70ebad66616601250f71", 0x5d, 0xfffffffffffffffc) keyctl$link(0x8, r3, r4) msgsnd(0x0, &(0x7f0000000040)={0x3}, 0x2000, 0x0) msgctl$IPC_RMID(0x0, 0x0) 23:17:26 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) sendmmsg(r1, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 23:17:26 executing program 1: clone(0x10000, &(0x7f0000000080)="a1551bce0d476e84e376973b23aaa61a7943b5abb4c4e7884eac6e3fd256e0ad2c2c15796f81d70ba5d611", &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000002c0)="4dee84fd7de4cb0deee33ea48a6a9d04fc55c1bd417ce4b0fc920c87f9a8a88d3b3fe470115a7a3725e19c3878067172479cd279d6a80a51363ca31cfc76ed3e600839c5cc4f024f4a56bde8e2e7249b3e9eea9609cc9a8b83c7081025037218edfc7e23c8d2959259b764993dfaa57208d54c167d30b42150e06c180cff1492301a5ff532201445945f1e73e99a56a58f0d1d02feec0127c16812ee4b13f5a97a5f03aa25e127772c3bb17e00e9944b4b2d3901fc5979998caf516d00fd7fe0b0334cc6") r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ipv6_route\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000040)='U', 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x11, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000100)=@caif=@rfm={0x25, 0x5, "8de06f55c742ae7c2bb7ed7767c245f6"}, 0x80, 0x0}, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0xa0, r2, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) preadv(r0, &(0x7f00000017c0), 0x1b9, 0x0) 23:17:26 executing program 4: io_setup(0x7f, &(0x7f00000000c0)=0x0) r1 = eventfd(0x0) io_submit(r0, 0x1, &(0x7f0000000b00)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) r2 = dup(r1) ioctl$GIO_CMAP(r2, 0x4b70, &(0x7f0000000080)) write$P9_RMKDIR(r2, &(0x7f0000000040)={0xfffffffffffffe6a}, 0x253) getsockopt$sock_buf(r2, 0x1, 0x3f, &(0x7f0000000300)=""/166, &(0x7f00000001c0)=0xa6) syz_open_dev$usbmon(&(0x7f0000000200)='/dev/usbmon#\x00', 0x844c, 0x17ceb839b06a19e5) prctl$PR_GET_KEEPCAPS(0x7) readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/167, 0xa7}], 0x1) 23:17:26 executing program 0: connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e24, @rand_addr=0xffffffffffff7fff}, 0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffffffffff01, 0x408100) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0xc8, "b150c8a9d2b1dd59bbbc507f87d8bec2b2869f540ca7933dfd68645c186dd778ef30a848c3d43d305377ed03e40588b1c33dc80177a7248a26ca2442757b512aa2caea756259bad6abc5505515a2e81c65d5ed2401b897e13a1177eede23a9a9050d2825a490c54e021b917cdec83d3bc82d78906a13d8580ff4954fe626109c51a74927e219d0ba897f2b38df08dff4d37670a40c22edb0aeeeb911f7ac6e9cdf958d0c9c4207faf73e0c68c3bb3a7bf22f98ee93225a89f37347307cb4b42fc33c8029cd0112fa"}, &(0x7f0000000200)=0xd0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000240)={r1}, &(0x7f0000000280)=0x8) open$dir(0x0, 0x0, 0x0) syz_open_dev$sndseq(0x0, 0x0, 0x0) set_mempolicy(0x8003, &(0x7f0000000000), 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = socket$rxrpc(0x21, 0x2, 0xa) bind$rxrpc(r2, &(0x7f00000000c0)=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) 23:17:26 executing program 5: getitimer(0x0, &(0x7f0000000080)) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000000800450000300000000000009078ac701400000000000500907800000600450000000000000000000000ac1414aa00000000796b8b3820d70100cad41bdf19b2b7c18bd4d99865e30ac7b7ea5c46350db8eeefc50f8984f872dd8f767fc410755e7342b4b22313f08d0d7af9"], 0x0) r0 = syz_open_dev$midi(&(0x7f00000000c0)='/dev/midi#\x00', 0x1f, 0x1) io_uring_register$IORING_UNREGISTER_EVENTFD(r0, 0x5, 0x0, 0x0) 23:17:26 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000100)=ANY=[@ANYBLOB="5b1ec301881099dc6662ee20c5284fab447ac9df1cef00d79f30e80574b4c514ef0a5f53fa18cc6d4a30874badb3f1580a745c9299941806eb7c2ac375a9c099c60e849d60dc4bca269dc2"]) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x4, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r3, 0xc040564b, &(0x7f00000000c0)={0x2, 0x0, 0x2009, 0x3, 0x0, {0x40, 0x47}}) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f0000000040)={0x3, 0x2, [{0x38d}]}) 23:17:26 executing program 3: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000140), 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/wireless\x00') setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0xd, 0x7, 0x2000}, 0x4) openat$null(0xffffffffffffff9c, 0x0, 0x2000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0x2, 0x0) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000180)={0x4a, 0x6f, 0x0, {0x5, [{0x10, 0x0, 0x3}, {0x80, 0x2, 0x4}, {0x0, 0x3}, {0x3c, 0x0, 0x3}, {0x4}]}}, 0x4a) ioctl$TIOCSTI(r0, 0x5412, 0xfffffffffffffff9) sendto(r1, &(0x7f0000000140)="120000001200e7ef007b1a3fcd00000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000037c0)=[{{0x0, 0x14e, 0x0, 0x0, 0x0, 0x24b, 0xb6c}}], 0x34, 0x0, 0x0) 23:17:26 executing program 4: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @aes256, 0x1, "f42a7fa3095f6db1"}) r1 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r1, 0x54a3) 23:17:26 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaa97aaaaaaaaaaaaaaaaaa080045000030001e000000019078ac7014bbac141490781800060a450000000000000000000000ac1414aaac1414000000002daa4577798fff58607178eebfd611b5f4b4b20c88c59cb8f05b2672a7e77c8e1317bfc12f60f3e013f2c625ae1e0e01e9f695c5e120cbbbc9d567355f1f8ed37659ce7a4d1d3586f03b7000f7ce3b2322a34e68faa5a18bc30086a733467cba9315d9c86a4c2d00afa48dba46beec3cc2f5e16282704f28f4ec453a95da3401a2764162cbe895ecba979bb9a77b511a7c66a8d1c877f8db3a4bc6a4e74b81c4ea0b86c1a66236e32864ab2fbccabd8938b33627ae7875b66eb9e6e84a2c7b2ca818f7c51da9a67f8f864754dc812ea5a1247cc5036b500f1688ce81694c76b141eef0"], 0x0) socket$rds(0x15, 0x5, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/conn_reuse_mode\x00', 0x2, 0x0) 23:17:26 executing program 4: r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x7}, 0x10) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000080)) write(r0, &(0x7f0000000040)="1c0000001a009b8a14e5f40700090424f0000000fe01000200020000", 0x1c) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f00000000c0)={0x3, 0x8, 0x3, 0x0, 0x0, [{r0, 0x0, 0x2572}, {r0, 0x0, 0x3f}, {r0, 0x0, 0x80}]}) 23:17:26 executing program 1: clone(0x10000, &(0x7f0000000080)="a1551bce0d476e84e376973b23aaa61a7943b5abb4c4e7884eac6e3fd256e0ad2c2c15796f81d70ba5d611", &(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000002c0)="4dee84fd7de4cb0deee33ea48a6a9d04fc55c1bd417ce4b0fc920c87f9a8a88d3b3fe470115a7a3725e19c3878067172479cd279d6a80a51363ca31cfc76ed3e600839c5cc4f024f4a56bde8e2e7249b3e9eea9609cc9a8b83c7081025037218edfc7e23c8d2959259b764993dfaa57208d54c167d30b42150e06c180cff1492301a5ff532201445945f1e73e99a56a58f0d1d02feec0127c16812ee4b13f5a97a5f03aa25e127772c3bb17e00e9944b4b2d3901fc5979998caf516d00fd7fe0b0334cc6") r0 = syz_open_procfs(0x0, &(0x7f0000000280)='net/ipv6_route\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000040)='U', 0x1}], 0x1}, 0x0) r1 = socket$kcm(0x11, 0x5, 0x0) setsockopt$sock_attach_bpf(r1, 0x107, 0x14, &(0x7f0000000000), 0x4) sendmsg$kcm(r1, &(0x7f0000000040)={&(0x7f0000000100)=@caif=@rfm={0x25, 0x5, "8de06f55c742ae7c2bb7ed7767c245f6"}, 0x80, 0x0}, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) prctl$PR_SET_FPEMU(0xa, 0x3) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f00000003c0)={0xa0, r2, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x12}}]}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x12}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x4000}, 0x40800) preadv(r0, &(0x7f00000017c0), 0x1b9, 0x0) 23:17:26 executing program 5: r0 = epoll_create1(0x0) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x300}) fsetxattr$security_ima(r0, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@sha1={0x1, "41925cea8033d6974129f234292ca0ccf0bf2aee"}, 0x15, 0x1) lookup_dcookie(0x2894, &(0x7f0000000100)=""/218, 0xda) r1 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x28, 0x8000) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = dup(r0) inotify_add_watch(r2, &(0x7f0000000200)='./file0\x00', 0x2000200) 23:17:26 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000001000010000fd00"/20, @ANYRES32, @ANYBLOB="00000000000000001800120014000100697036677265746170000000040002001baa86082933eb4c3a7cd6af0740c8eb79cd0643871651c9943e3b390a5a4179fea9a27cd3932964b26668778e9bc50b"], 0x38}}, 0x0) sendmmsg$sock(r0, &(0x7f00000013c0)=[{{&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x1, 0x3, 0x4, 0x3, {0xa, 0x4e22, 0x40000000, @empty, 0x7}}}, 0x80, &(0x7f0000001340)=[{&(0x7f0000000180)="e63aa6b41b66bbab4a2f16bc6c98f9e62212df39c3", 0x15}, {&(0x7f00000001c0)="dbd7e20149665cd9850365bae3867338b24797e4f6d481a724b7f621139cbf485abae6d1c63ba917c5d2b18a191d7b06aa766735ff973211b6fa5d520df974f7fdd2a335784a9bcb89960dd76136e8c55b7165c67dd5207e7d8ec74df0dd34e30abc39a6c6a2a268fcb8da24c24c0d5435c9f3e32dc979842ac90af29437f722b177a50b96bbf14fd5113ef666b697e4a684cb5588bbf5374e839688ee1e67c254dfbd1abd63dca05d84a41207ee7df7910d2bd2f3a77f6eec0507b1a7cfd52cf0c0d1526108dd005c71bf23030c00496bc6ab", 0xd3}, {&(0x7f00000002c0)="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", 0x1000}, {&(0x7f00000012c0)="3dfdb88de522cec8e9891226358fe7c7171cdba933ab5b50ab30b639a68a414f9af75d17d75f1ad50ac332a6a9f493da35050795c9a0543a0191904fe53d08877f1e335ae73d5a82cc0a95990ebe14c6e57dd76d86b8d92c932d8b7b25cdd16e53290e6fc18a1a7c3b1b91", 0x6b}], 0x4, &(0x7f0000001380)=[@txtime={{0x18, 0x1, 0x3d, 0x3}}], 0x18}}], 0x1, 0x4000) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000001400)) 23:17:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000600)=""/127, 0x7f}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) sendto$isdn(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1, 0x10, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000002c0)) sendmsg$FOU_CMD_GET(r1, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x800, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0xb1, 0x2, 0x3, 0x6, 0x80}, 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x3, {0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}, 0xffffffff}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r4}}, 0x18) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240)={0x7f, 0x400, 0x140000000, 0x8b0b}, 0x8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/mixer\x00', 0x10101, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000440)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000700)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, r5) getsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f00000001c0), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, 0x0, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="b7000000000000003c000040000000001f010000000000000000009dfbbcdd5d41cd625879ba650e030000000100"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f0000000500)={0x0, 0x0, {0x80000001, 0x5, 0x0, 0xf, 0xa, 0x0, 0x2}}) 23:17:27 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) socket$packet(0x11, 0x4004, 0x300) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$KVM_SET_VAPIC_ADDR(r0, 0x4008ae93, &(0x7f00000000c0)=0x44) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_mr_vif\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x661, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r1, &(0x7f00000017c0), 0x1be, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000100)=""/91) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x101040, 0x0) 23:17:27 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000100)={@empty, @remote}, 0x8) r1 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x4, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00c@@'], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000380)={0x4, 0x0, &(0x7f00000001c0)=[@enter_looper], 0x1, 0x0, &(0x7f0000000200)="86"}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000000c0)={0x1c, 0x0, &(0x7f0000000040)=[@clear_death={0x400c630f, 0x1}, @dead_binder_done], 0xd9, 0x0, &(0x7f0000000240)="ad4d670032029b218d046b90a1ef2ff310dc14ccb3b6bc5c0ca11b634b94b1af871f313daa22bce07b023709ba60bb00c65dcc9131decb343d47bfbe211230ea07ac35d60d82a43a41e58aa16ee073912a7047851ece52ea6304ebb877892eae0bfc7fec0eb4155368ce381309876de18fd0a4fabe3f7ee5cc6ddca92dcbcd8793948c72ad6308872099109a4b6b4f49c7fd26083d20ea31cff9122a7ed1320c131f33ee421a1a1727b5382175787888dd10b342f99906378fcb866f03bf627db3b95cbfe0040bd5d6206f372e18b887353804a5cf638e7fd6"}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000180)={0xc, 0x0, &(0x7f0000000000)=[@free_buffer={0x40406301}], 0x0, 0x0, 0x0}) 23:17:27 executing program 0: prctl$PR_SVE_GET_VL(0x33, 0x2ce0) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYRESOCT], 0x0) 23:17:27 executing program 1: r0 = syz_open_dev$video4linux(&(0x7f00000001c0)='/dev/v4l-subdev#\x00', 0x3, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0xc000) ioctl$VHOST_SET_VRING_ENDIAN(r1, 0x4008af13, &(0x7f0000000080)={0x3, 0xac5}) ioctl$VIDIOC_SUBSCRIBE_EVENT(r0, 0xc0585605, &(0x7f0000000000)={0x0, 0x1}) [ 201.581594][ T9680] debugfs: File '9678' in directory 'proc' already present! [ 201.653596][ T9680] binder_alloc: 9678: binder_alloc_buf, no vma 23:17:27 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x8002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r0, &(0x7f00000003c0)="b63db85e1e8d06000000001d003ef0011dcc606a010000807018cebc9b97ae21b14d872c678ce22c9b160096aa1fae1a", 0x58) socketpair(0x1f, 0x8000b, 0x5, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 23:17:27 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200401, 0x0) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000bc0)={&(0x7f0000000080), 0xc, &(0x7f0000000b80)={&(0x7f0000000c00)=ANY=[@ANYBLOB="bc0700002d0001002dbd7000ffdbdf2500000000", @ANYRES32, @ANYBLOB="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"/1777, @ANYRES32, @ANYBLOB="700006007625f34d75a01d23f5376d6d81e5ebcf2846b049b8028a1588f8c2416a3cb4b5d2cc526b1c636429e0adeee0d61c3bb296c17f9a74829c13cdb56170e80d300b3cb319d02aa5061e8521f35d923fdc9427dad2a59e2a7b32ceb4f7a9d6a341c1606ad75f031c818f832a527ce07b9565784d3e260f192f7326e3af000000080002007fffffff14000800687773696d300000000000000000000008000b0003000009080002004000007463696e6465780014000200a2621c7b8b0711b067b2329f08000400feff"], 0x7bc}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) r2 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xfffffffffffffbff, 0x101000) ioctl$EVIOCGABS20(r2, 0x80184560, &(0x7f00000000c0)=""/205) 23:17:27 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x1e, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0x10) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x1, 0x0) write$nbd(r2, &(0x7f0000000200)={0x67446698, 0x0, 0x1, 0x2, 0x1, "b459e85bcd69c78a2a829e06375033718169642ef6353e3203b224d0a0e00e727eb492155d4d2992fbf155859adf1369fa57bfd0b7d4f77b4edebf86c6db795e7cec0a6281af30aea1144215f78a6ad20eb666f76ce70c9502573abbaeb3d8af789456820a8f250dcbf498ee9fc97fa6d8239e74f7361d92e5554fca05f1f7a799dd3a7d75111eaea158ed2d4b9aaa706b776aee22f3e5b16e2e5e3aeacc6cf0621d0e71299fa7d189e1d493259f4e6ca7126d2c1d3d60abc3346365f9960a23c2e5dd17b1b0cff58042f1ea98ee9cf39dbc20cc491508f26b783cc45c364384a9ce4435ff2cc8a6ce5147dce9311b"}, 0xff) 23:17:27 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f0000000100)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) ioctl(r0, 0x1000008912, &(0x7f0000000300)="11dca50dfbc917c37bf070") sendto$inet(r0, &(0x7f0000000140)="0f", 0x1, 0x420ffe0, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000080)="92", 0x1, 0x4004001, 0x0, 0x0) [ 201.828957][ T9696] netlink: 1592 bytes leftover after parsing attributes in process `syz-executor.0'. [ 201.833129][ T9694] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 201.868885][ T9696] netlink: 1592 bytes leftover after parsing attributes in process `syz-executor.0'. [ 201.878445][ T9701] sg_write: data in/out 429306/40 bytes for SCSI command 0x67-- guessing data in; [ 201.878445][ T9701] program syz-executor.3 not setting count and/or reply_len properly 23:17:27 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'tgr160-generic\x00'}, 0x53) r1 = accept(r0, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f0000001740)={0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f00000000c0)="c470685a750e8313a604ea8a74bb512743dc252eb959e7fb60e9c3963deed3ca2b925696395713a4dbae0dea6a4084eda710d7cea10d42d092a230ef3b0c4d2a1a50d81bfb8c668668a23456128d8d4d261f2583b001642588fd8571ccf9590222786e6bb942940fab1e0d8a5b4e457374c5956043e255c9ca7ededf2978c82cd9cab207d3e2330088cad117de8350a1f2a650fc43affff13798a48b97052f87be4222a8cf9691e1d961f8b2cb50992ae56d8cdfd8950d248fa793bafdaacbe09bd25b02d060e2de2fde1e0ffcd8294719e1c038a6ad86982269c90eb21b2ef5b84bb4548711abc55da629c69270e97c4095f9", 0xf3}, {&(0x7f0000001240)="76ac8219d26c93e8e061d3aece0451d1ffb01928bbe25891c2413da7f8c115f1ecf0cb0adadbfae31ef55b8d9a01ec5c05a409f10a1d6037f7311385", 0x3c}, {&(0x7f0000001280)="fae364d00e4a05bc75e4cc375dbaf02c0ca2b07d5a437b25baa9d60b399ff5ad960b1e29d96f8544c0b6ae26a5a597d1", 0x30}], 0x3}, 0x0) unshare(0x10000) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x80081, 0x0) ioctl$TIOCMGET(r2, 0x5415, &(0x7f0000000040)) write$tun(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="00000007020307008100010002006ec7577d016b3e07fe800000000000000000000000000024fe000000000000000018bc01000000000000c20400000005c20400000005000000007e0404029d080800fe8000000000000000000000000000910000000000000000000000000000000100000401660000003d02020000000000fe880000000000000000000000000101060a020400000000ff020000000000000000000000000001fe8000000000000000000000000000bb0000000000000000000000000000000062c589666f704f41ffb1f42c6233bd7fff0200000000000000000000000000014e214e2104f190782a40938a012a17c0d439d4f00f0d972275214313d34c480c3c7b8c12dffba90555bf6c9e141dc0469f24e1e6bab1390fbf73f68aaed742bbaa42bc20342b01983e3c8582e8ec52937287dc1601572a34d47caed3837d49d143d8dc1019b92e65a7a7d5f29dce8620253c0d189afbf463c27ee474d7e850271060aa4b4bc94560f416660b72cbc4bb4c65910d42f55df58373c047004b941a74f822846c110191715ffafe9b264fb72e8075000000000000"], 0x1a1) 23:17:27 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x5460, &(0x7f0000000040)={0x0, 0x0, 0x7}) [ 201.945680][ T9705] sg_write: data in/out 429306/40 bytes for SCSI command 0x67-- guessing data in; [ 201.945680][ T9705] program syz-executor.3 not setting count and/or reply_len properly 23:17:27 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x4) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000006400)='devpts\x00vh\xd2p!s\n@ha.\xc1\x88\x05\x89\x1d\b\xb3Xd\x92Y\x1b\x8c\xc0\xd0\xf4\x952\x8c!JC\xd1]Ul\xa2\x80\x19\x88 \xd4b\x0f\x87\x89P\xb4M\xf7]w\xa9\xb6\xc3}\x16\f\x87ueg$\xd9,\x8c\x9b\xbb*\xfe\x95\xb8\xa1\x9aVA\xb73w\xdf/\xa9\xc5\x8e\xe1\xef\xc5\x8d\x168\xba\"\x83\x8b\xe2\xf7*\xfa\xd20a\x94\xc7yiF\a\v\x14\xd2\xc1z\x94\x9d\x9d\a*\xab\xea\xd9Ee\xac\xa28p\xa2\xa1\x9a;\xb4o\xa0\xf1\xd7&[2\xf2\x82\xbc\xc2tu\xfb\xf5\xb1Y\xd6\xa9\x1b\xbec\xdeA\x8d\x94W)\x93,\xac\x02\x86\xd1\r\x00\xefZ\xf3Y\x84\xdbF\xf2u\xa1\x8b_\x9fe\xfe[q\xb1\\\xcen\bC \x81', 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x40800, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000006200)='/dev/dsp#\x00', 0xac1e, 0x0) r1 = accept4$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000003740)=0xfffffffffffffe4e, 0x7fffd) recvmmsg(r1, &(0x7f0000005f40)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000180)=""/116, 0x74}, {&(0x7f0000000340)=""/154, 0x9a}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/128, 0x80}, {&(0x7f0000000100)=""/55, 0x37}], 0x5}, 0x14000000}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000200)=""/7, 0x7}, {&(0x7f0000001500)=""/47, 0x2f}, {&(0x7f0000001540)=""/46, 0x2e}, {&(0x7f0000001580)=""/22, 0x16}, {&(0x7f00000015c0)=""/254, 0xfe}, {&(0x7f00000016c0)=""/231, 0xe7}, {&(0x7f00000017c0)=""/135, 0x87}], 0x7, &(0x7f0000001900)=""/189, 0xbd}, 0xf70}, {{0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f00000019c0)=""/44, 0x2c}], 0x1, &(0x7f0000001a40)=""/89, 0x59}, 0x8}, {{&(0x7f0000001ac0)=@un=@abs, 0x80, &(0x7f0000001bc0)=[{&(0x7f0000001b40)=""/94, 0x5e}], 0x1}, 0x80}, {{&(0x7f0000001c00)=@alg, 0x80, &(0x7f0000002ec0)=[{&(0x7f0000001c80)=""/109, 0x6d}, {&(0x7f0000001d00)=""/4096, 0x1000}, {&(0x7f0000002d00)=""/134, 0x86}, {&(0x7f0000002dc0)=""/213, 0xd5}], 0x4}, 0x3b}, {{&(0x7f0000002f00)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002f80)=""/1, 0x1}], 0x1, &(0x7f0000003000)=""/254, 0xfe}, 0xfffffffffffeffff}, {{&(0x7f0000003100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}}}, 0x80, &(0x7f0000003440)=[{&(0x7f0000003180)=""/60, 0x3c}, {&(0x7f00000031c0)=""/253, 0xfd}, {&(0x7f00000032c0)=""/133, 0x85}, {&(0x7f0000003380)=""/190, 0xbe}], 0x4, &(0x7f0000003480)=""/111, 0x6f}, 0x1}, {{&(0x7f0000003500)=@vsock, 0x80, &(0x7f0000003ac0)=[{&(0x7f0000003580)}, {&(0x7f00000035c0)=""/217, 0xd9}, {&(0x7f00000036c0)=""/101, 0x65}, {&(0x7f0000003740)}, {&(0x7f0000003780)=""/190, 0xbe}, {&(0x7f0000003840)=""/35, 0x23}, {&(0x7f0000003880)=""/123, 0x7b}, {&(0x7f0000003900)=""/34, 0x22}, {&(0x7f0000003940)=""/153, 0x99}, {&(0x7f0000003a00)=""/154, 0x9a}], 0xa, &(0x7f0000003b80)=""/124, 0x7c}, 0x80000001}, {{&(0x7f0000003c00)=@alg, 0x80, &(0x7f0000003d40)=[{&(0x7f0000003c80)=""/192, 0xc0}], 0x1, &(0x7f0000003d80)=""/4096, 0x1000}, 0x599c}, {{0x0, 0x0, &(0x7f0000005e00)=[{&(0x7f0000004d80)=""/4096, 0x1000}, {&(0x7f0000005d80)=""/126, 0x7e}], 0x2, &(0x7f0000005e40)=""/239, 0xef}, 0xdc}], 0xa, 0x40000000, &(0x7f00000061c0)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000080)) 23:17:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000600)=""/127, 0x7f}], 0x1) sendmmsg$alg(r1, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) sendto$isdn(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x1, 0x10, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, &(0x7f00000002c0)) sendmsg$FOU_CMD_GET(r1, 0x0, 0x0) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000080)) r2 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x800, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000280)={0xb1, 0x2, 0x3, 0x6, 0x80}, 0x14) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000140)={0xffffffffffffffff}, 0x3, {0xa, 0x4e20, 0x0, @ipv4={[], [], @empty}, 0xffffffff}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r2, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000100), r4}}, 0x18) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240)={0x7f, 0x400, 0x140000000, 0x8b0b}, 0x8) openat$mixer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/mixer\x00', 0x10101, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r3, 0x5387, &(0x7f0000000440)) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000700)) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, 0x0) chown(&(0x7f0000000040)='./file0\x00', 0x0, r5) getsockopt$inet_dccp_int(r1, 0x21, 0x10, &(0x7f00000001c0), 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, 0x0, &(0x7f00000004c0)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="b7000000000000003c000040000000001f010000000000000000009dfbbcdd5d41cd625879ba650e030000000100"], &(0x7f0000003ff6)='OPL\x00', 0x1, 0xff06, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffde7, 0x10, &(0x7f0000000000), 0x193}, 0x48) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, &(0x7f0000000500)={0x0, 0x0, {0x80000001, 0x5, 0x0, 0xf, 0xa, 0x0, 0x2}}) 23:17:28 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = inotify_init1(0x0) socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000080)='\x1a') inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f00000000c0)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r2, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, r3, 0x0, 0x70bd25, 0x25dfdbfb, {}, ["", "", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x840) creat(&(0x7f00000001c0)='./file0/file0\x00', 0x0) fadvise64(r1, 0x0, 0x15, 0x4) [ 202.299405][ T9680] debugfs: File '9678' in directory 'proc' already present! [ 202.324558][ T9687] binder_alloc: 9678: binder_alloc_buf, no vma 23:17:28 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0xfffffe12) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x402800, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000000240)=""/177) read$FUSE(r0, &(0x7f00000003c0), 0x1000) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001440)={0x0, 0x0}, &(0x7f0000001480)=0xc) stat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1000003, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@euid_gt={'euid>', r4}}, {@uid_eq={'uid', 0x3d, r5}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/dev/autofs\x00'}}, {@subj_role={'subj_role', 0x3d, '/dev/autofs\x00'}}, {@obj_type={'obj_type'}}, {@appraise_type='appraise_type=imasig'}, {@seclabel='seclabel'}, {@audit='audit'}]}}) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x10, 0x0, 0x2}, 0x10) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f00000000c0)={0x30, 0x5, 0x0, {0x40000000, 0x1}}, 0x30) 23:17:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x7fff, 0x0) ioctl$VIDIOC_S_FMT(r1, 0xc0d05605, &(0x7f0000000040)={0x0, @pix_mp={0x0, 0x0, 0x30314247}}) ioctl$VIDIOC_TRY_FMT(0xffffffffffffffff, 0xc0d05640, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffff9c, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="f3000000b600d3a13a86b0b693b2715882c15e54926bf9b70bb4ee3a3523a9311739d57122a35d2a26ce393e98a5b488fd16eda95930e644437a67bc6d81d64e3d86c002c08a34031eb615620043dce72c630e014d1bb7c7f4a3d17fd4cac26b3bfad9b0307f2a29bb48a8738816e05cfb83557ec4b3468c8f0c7767ccbc6be384589bdc6a1717d024bd73237eeceea01fefa785874f56e07d0ac0d0853a050d9cbe69ee"], &(0x7f00000005c0)=0x2) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000500)) ioctl$VIDIOC_S_STD(r1, 0x40085618, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x300, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x1c}}, 0x4000840) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, 0x0) ioctl$KVM_GET_DEBUGREGS(0xffffffffffffffff, 0x8080aea1, 0x0) 23:17:28 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @ipv4}, 0x1c) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x40040, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000100)={@broadcast, @multicast1, 0x0}, &(0x7f0000000180)=0xc) recvfrom$packet(r1, &(0x7f0000000000)=""/136, 0x88, 0x40, &(0x7f00000001c0)={0x11, 0x19, r2, 0x1, 0x2, 0x6, @local}, 0x14) 23:17:28 executing program 5: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0xa02) ioctl$FS_IOC_FSGETXATTR(r0, 0x80045515, &(0x7f0000000040)={0x2000000, 0x200000, 0x7ff, 0x0, 0x0, 0x200000000000000}) ioctl$VIDIOC_S_JPEGCOMP(r0, 0x408c563e, &(0x7f0000000080)={0x81, 0xa, 0x1, "ac725be91e2718ef57d4f1163339cef056a47b964a9f6ac2b0feaee0e9d080a7b28c568649a77c96e131881aca02d746d6f83dc39d57633d2ce0f5cd", 0x1c, "e0844da94e0cb8a456087fe3644f7b5f4bfe356c7f863288da5399d824ecdc68465c9af2afe88136388801a21b776bf4896bbc125f17931622aeac82", 0xa8}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000140)=""/164) 23:17:28 executing program 3: munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x800, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mlock2(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @empty}, @in=@empty}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f0000000140)=0xe8) 23:17:28 executing program 1: r0 = socket$kcm(0x29, 0x5, 0x0) accept(r0, &(0x7f0000000040)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000200)=0x80) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x18616d37, &(0x7f00000000c0)=[{&(0x7f0000000440)="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", 0xd8}], 0x1, 0x0, 0xfffffffffffffddd}, 0x0) writev(r1, &(0x7f00000002c0)=[{&(0x7f0000000240)="0d81aabb166200e58d6a25016aa6ad3c9ac101c6affc2109509c4faa9a143b28e56bad31d98d7db916f92036402bd0a7666ab8228e0c22126e2d6f5c598a3daa820958d922529fe558afd2", 0x4b}], 0x1) 23:17:28 executing program 5: syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000037000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffba) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x9e000000, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0xb, 0x102, 0x6, {0xb55, 0x8, 0x1, 0x2}}) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000140)) ptrace(0x10, r1) ptrace$getregset(0x4204, r1, 0x202, &(0x7f0000001100)={&(0x7f0000004540)=""/4096, 0x4f8}) ptrace$getsig(0x4202, r1, 0x10000, &(0x7f00000000c0)) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000080)={0x7, 0xffffffffffffffff, 0x1}) kcmp(r1, r1, 0x5, r2, r3) 23:17:28 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa1f, 0x802) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) r4 = syz_open_dev$admmidi(&(0x7f0000001e80)='/dev/admmidi#\x00', 0x2, 0x100) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, &(0x7f0000001ec0)=0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000040)=""/22) r5 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000a00)={0x7dff55ca, 0x6, 0x8, 0x0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) connect$can_bcm(r3, &(0x7f0000001e40)={0x1d, r6}, 0x10) recvmsg(r5, &(0x7f0000000840)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001f00)=""/242, 0xf2}, {&(0x7f0000000440)=""/175, 0xaf}, {&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f0000000600)=""/180, 0xb4}], 0x5, &(0x7f0000000740)=""/211, 0xd3}, 0x120) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={@mcast1, @dev={0xfe, 0x80, [], 0x14}, @loopback, 0x6, 0x6, 0x4, 0x500, 0x0, 0x49, r6}) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) recvmsg(r3, &(0x7f0000001dc0)={&(0x7f0000000a80)=@rc, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/35, 0x23}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/44, 0x2c}, {&(0x7f0000001c40)=""/158, 0x9e}, {&(0x7f0000001d00)=""/25, 0x19}], 0x6}, 0x100) ioctl(r3, 0x8, &(0x7f0000001e00)="e9a746a9b1fd77e40b10cf242ee34052e0e4b27a011c5a36e2e67e") sendto(r5, &(0x7f0000000200), 0x40900, 0x0, 0x0, 0x0) fcntl$getown(r5, 0x9) sendfile(r0, r1, 0x0, 0x20) 23:17:28 executing program 3: r0 = socket$inet(0x10, 0x3, 0x3f) r1 = socket$inet6(0xa, 0x803, 0xfff) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000600)="4c0000001500ff09fffefd956fa283b70aa6008000000000000000683540150024001d001fc41180b598bc593ab6821148a730de33a49868c62b2ca654a6613b6aabf35d0f1cbc882b079881", 0x4c}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000080)={'ip_vti0\x00', 0x8}) 23:17:28 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x5, 0x0) r2 = socket$inet(0x2, 0x80001, 0x84) setsockopt$sock_int(r1, 0x1, 0x100000000002, &(0x7f0000000000)=0x2, 0x28e) bind$inet(r2, &(0x7f0000000540)={0x2, 0x4e20, @local}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x1a, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], 0x348) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) 23:17:28 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa1f, 0x802) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) r4 = syz_open_dev$admmidi(&(0x7f0000001e80)='/dev/admmidi#\x00', 0x2, 0x100) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, &(0x7f0000001ec0)=0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000040)=""/22) r5 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000a00)={0x7dff55ca, 0x6, 0x8, 0x0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) connect$can_bcm(r3, &(0x7f0000001e40)={0x1d, r6}, 0x10) recvmsg(r5, &(0x7f0000000840)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001f00)=""/242, 0xf2}, {&(0x7f0000000440)=""/175, 0xaf}, {&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f0000000600)=""/180, 0xb4}], 0x5, &(0x7f0000000740)=""/211, 0xd3}, 0x120) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={@mcast1, @dev={0xfe, 0x80, [], 0x14}, @loopback, 0x6, 0x6, 0x4, 0x500, 0x0, 0x49, r6}) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) recvmsg(r3, &(0x7f0000001dc0)={&(0x7f0000000a80)=@rc, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/35, 0x23}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/44, 0x2c}, {&(0x7f0000001c40)=""/158, 0x9e}, {&(0x7f0000001d00)=""/25, 0x19}], 0x6}, 0x100) ioctl(r3, 0x8, &(0x7f0000001e00)="e9a746a9b1fd77e40b10cf242ee34052e0e4b27a011c5a36e2e67e") sendto(r5, &(0x7f0000000200), 0x40900, 0x0, 0x0, 0x0) fcntl$getown(r5, 0x9) sendfile(r0, r1, 0x0, 0x20) 23:17:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0xb, &(0x7f0000000040)='/dev/midi#\x00', 0xffffffffffffffff}, 0x30) ptrace(0x11, r2) r3 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0x2, 0x40) write$P9_RCREATE(r3, &(0x7f0000000080)={0x18, 0x73, 0x2, {{0x80}, 0xfffffffffffffff8}}, 0x18) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sendmsg$IPVS_CMD_NEW_DEST(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x8001, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_GET_VCPU_EVENTS(r4, 0x4400ae8f, &(0x7f0000000000)) r6 = getpgid(0x0) r7 = gettid() tgkill(r6, r7, 0x37) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:17:29 executing program 4: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa1f, 0x802) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) r4 = syz_open_dev$admmidi(&(0x7f0000001e80)='/dev/admmidi#\x00', 0x2, 0x100) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, &(0x7f0000001ec0)=0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000040)=""/22) r5 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000a00)={0x7dff55ca, 0x6, 0x8, 0x0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) connect$can_bcm(r3, &(0x7f0000001e40)={0x1d, r6}, 0x10) recvmsg(r5, &(0x7f0000000840)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001f00)=""/242, 0xf2}, {&(0x7f0000000440)=""/175, 0xaf}, {&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f0000000600)=""/180, 0xb4}], 0x5, &(0x7f0000000740)=""/211, 0xd3}, 0x120) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={@mcast1, @dev={0xfe, 0x80, [], 0x14}, @loopback, 0x6, 0x6, 0x4, 0x500, 0x0, 0x49, r6}) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) recvmsg(r3, &(0x7f0000001dc0)={&(0x7f0000000a80)=@rc, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/35, 0x23}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/44, 0x2c}, {&(0x7f0000001c40)=""/158, 0x9e}, {&(0x7f0000001d00)=""/25, 0x19}], 0x6}, 0x100) ioctl(r3, 0x8, &(0x7f0000001e00)="e9a746a9b1fd77e40b10cf242ee34052e0e4b27a011c5a36e2e67e") sendto(r5, &(0x7f0000000200), 0x40900, 0x0, 0x0, 0x0) fcntl$getown(r5, 0x9) sendfile(r0, r1, 0x0, 0x20) 23:17:29 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000180)={0x6, 0x4, 0x2}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) 23:17:29 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa1f, 0x802) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) r4 = syz_open_dev$admmidi(&(0x7f0000001e80)='/dev/admmidi#\x00', 0x2, 0x100) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, &(0x7f0000001ec0)=0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000040)=""/22) r5 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000a00)={0x7dff55ca, 0x6, 0x8, 0x0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) connect$can_bcm(r3, &(0x7f0000001e40)={0x1d, r6}, 0x10) recvmsg(r5, &(0x7f0000000840)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001f00)=""/242, 0xf2}, {&(0x7f0000000440)=""/175, 0xaf}, {&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f0000000600)=""/180, 0xb4}], 0x5, &(0x7f0000000740)=""/211, 0xd3}, 0x120) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={@mcast1, @dev={0xfe, 0x80, [], 0x14}, @loopback, 0x6, 0x6, 0x4, 0x500, 0x0, 0x49, r6}) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) recvmsg(r3, &(0x7f0000001dc0)={&(0x7f0000000a80)=@rc, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/35, 0x23}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/44, 0x2c}, {&(0x7f0000001c40)=""/158, 0x9e}, {&(0x7f0000001d00)=""/25, 0x19}], 0x6}, 0x100) ioctl(r3, 0x8, &(0x7f0000001e00)="e9a746a9b1fd77e40b10cf242ee34052e0e4b27a011c5a36e2e67e") sendto(r5, &(0x7f0000000200), 0x40900, 0x0, 0x0, 0x0) fcntl$getown(r5, 0x9) sendfile(r0, r1, 0x0, 0x20) 23:17:29 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r3 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xa1f, 0x802) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000340), &(0x7f00000003c0)=0x68) r4 = syz_open_dev$admmidi(&(0x7f0000001e80)='/dev/admmidi#\x00', 0x2, 0x100) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, &(0x7f0000001ec0)=0x2) ioctl$KVM_PPC_GET_SMMU_INFO(r3, 0x8250aea6, &(0x7f0000000040)=""/22) r5 = socket$l2tp(0x18, 0x1, 0x1) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, &(0x7f0000000a00)={0x7dff55ca, 0x6, 0x8, 0x0, &(0x7f0000000880)=[{}, {}, {}, {}, {}, {}]}) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000180)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) connect$can_bcm(r3, &(0x7f0000001e40)={0x1d, r6}, 0x10) recvmsg(r5, &(0x7f0000000840)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000006c0)=[{&(0x7f0000001f00)=""/242, 0xf2}, {&(0x7f0000000440)=""/175, 0xaf}, {&(0x7f0000000100)=""/22, 0x16}, {&(0x7f0000000500)=""/236, 0xec}, {&(0x7f0000000600)=""/180, 0xb4}], 0x5, &(0x7f0000000740)=""/211, 0xd3}, 0x120) ioctl$sock_inet6_SIOCDELRT(r3, 0x890c, &(0x7f00000002c0)={@mcast1, @dev={0xfe, 0x80, [], 0x14}, @loopback, 0x6, 0x6, 0x4, 0x500, 0x0, 0x49, r6}) connect$l2tp(r5, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) recvmsg(r3, &(0x7f0000001dc0)={&(0x7f0000000a80)=@rc, 0x80, &(0x7f0000001d40)=[{&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000001b00)=""/35, 0x23}, {&(0x7f0000001b40)=""/161, 0xa1}, {&(0x7f0000001c00)=""/44, 0x2c}, {&(0x7f0000001c40)=""/158, 0x9e}, {&(0x7f0000001d00)=""/25, 0x19}], 0x6}, 0x100) ioctl(r3, 0x8, &(0x7f0000001e00)="e9a746a9b1fd77e40b10cf242ee34052e0e4b27a011c5a36e2e67e") sendto(r5, &(0x7f0000000200), 0x40900, 0x0, 0x0, 0x0) fcntl$getown(r5, 0x9) sendfile(r0, r1, 0x0, 0x20) 23:17:29 executing program 5: r0 = syz_open_dev$audion(0x0, 0x0, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x10000000002) 23:17:29 executing program 3: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000a40)='./file0\x00') r0 = open(&(0x7f00000008c0)='./file0\x00', 0x20141042, 0x0) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0x401) write$UHID_INPUT(r0, &(0x7f0000000c80)={0x8, "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", 0xf05}, 0x1006) lseek(r0, 0x0, 0x4) 23:17:29 executing program 1: syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x240000) r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x40400) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xc002, 0x0) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f00000000c0), &(0x7f00000002c0)=0x2) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000200)={{0x800000000000000}, 'port0\x00', 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}) getresgid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000100)) ioctl$KVM_PPC_ALLOCATE_HTAB(r1, 0xc004aea7, &(0x7f0000000300)=0x4) 23:17:29 executing program 3: r0 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205647, &(0x7f0000000080)={0x0, 0x1, 0x0, [], &(0x7f00000002c0)={0xf0f043, 0x0, [], @p_u16=0x0}}) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000040)=0x1c) 23:17:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x7}, 0x4) setsockopt$sock_int(r0, 0x1, 0x13, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:17:29 executing program 4: lstat(0x0, 0x0) fstat(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x80, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f00000002c0)=0x1, 0x4) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x0, &(0x7f0000000000)=0x1, 0xffb9) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, &(0x7f00000000c0)={'gre0\x00', {0x2, 0x4e22, @multicast1}}) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) setxattr$security_smack_transmute(0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) 23:17:29 executing program 1: arch_prctl$ARCH_SET_GS(0x1001, 0x401) r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/ip6_mr_vif\x00') connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x0, @reserved}, 0x10) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x1) readv(r0, &(0x7f0000000580), 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000040)=0x3a2fd395, 0x8) 23:17:29 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) shutdown(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_buf(r1, 0x1, 0x3b, 0x0, &(0x7f0000000040)) ioctl$VHOST_NET_SET_BACKEND(0xffffffffffffffff, 0x4008af30, 0x0) socketpair(0xf, 0x80803, 0x5, &(0x7f0000000100)) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x40000, 0x0) ioctl$KVM_SET_XSAVE(0xffffffffffffffff, 0x5000aea5, 0x0) semget$private(0x0, 0x0, 0x20) write$P9_RWRITE(r2, &(0x7f0000000080)={0xb, 0x77, 0x2, 0x3e}, 0xb) unshare(0x600) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) open(0x0, 0x7ffffffff, 0x44) ioctl$UI_SET_FFBIT(r2, 0x4004556b, 0x32) prctl$PR_SET_DUMPABLE(0x4, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000280)={'bond_slave_0\x00'}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00', {0x2, 0x0, @loopback}}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") syz_genetlink_get_family_id$fou(&(0x7f00000000c0)='fou\x00') getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000000c0)={0x0, 0x1c, &(0x7f0000000380)=[@in6={0xa, 0x0, 0x0, @rand_addr="6e31bfd72c89323c0c80b5167329292c"}]}, &(0x7f00000003c0)=0x10) setsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000000)=@assoc_value={r4}, 0x8) io_setup(0x80400000000002, &(0x7f00000000c0)=0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) io_getevents(r5, 0x2, 0x2, &(0x7f0000000400)=[{}, {}], 0x0) io_destroy(r5) 23:17:29 executing program 5: r0 = syz_open_dev$audion(0x0, 0x0, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x10000000002) 23:17:29 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x612080, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000000c0)={0x18, 0x0, &(0x7f0000000080)=[@exit_looper, @acquire_done={0x40106309, 0x2}], 0xb3, 0x0, &(0x7f0000000140)="dd7a9d656ec049b9f8bf8fe3ec5410e7d1801bbb53b66df7bcdac2956fc679b64d6fdf00433bb205077804d754b837a8d01c2919da8fb71446082acf23db0abacd15fab3443ba6fdfbf0ba696b680e0a15b9ab9ef2823628da893cc31af25ea19b03125e4a3848358ccbd62359baa5ff4b158498cb8150b8a16e462db0a5593eb3e66f9a905d69ac7c4649b5fedc52b7e5591540ded00a8c24491944a1cfab7ba5dd598a88119369fd5d98c45109f9a20482ce"}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='vegas\x00', 0x6) shutdown(r3, 0x1) sendto$inet6(r1, &(0x7f00000000c0), 0x0, 0x1f4, 0x0, 0x0) 23:17:30 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x380000, @loopback}, 0x1c) timer_create(0x6, &(0x7f0000000100)={0x0, 0x35, 0x1, @thr={&(0x7f0000000600)="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", &(0x7f00000000c0)='K'}}, &(0x7f0000000140)=0x0) timer_delete(r2) r3 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x40, 0x0) ioctl$ION_IOC_HEAP_QUERY(r3, 0xc0184908, &(0x7f0000000240)={0x34, 0x0, &(0x7f00000001c0)}) sendmmsg$alg(r0, &(0x7f0000000200)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@assoc={0x18, 0x29, 0x3}], 0x18}], 0x1, 0x0) 23:17:30 executing program 1: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000300)={0xffffffffffffffff, 0x0, &(0x7f0000000080)}, 0x20) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f0, &(0x7f0000000300)='gre0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f3, &(0x7f0000000300)='gre0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='\xc1v1\x8bz\xcdl\xbb\xdf]\xb7\xb4&\x92\xd7\xc5\xa1\xd2\x91)\xb8tD\xbb\xa0<\xf7\xd1\xf4\xe9\xc8R\x00\x95\b\xf1\xbb:\xdd\xee\x00\x81@D\xe3\xd2\xe5=\xd6>\xcc7ze\x1e\x02\xeb\x98h\x87\x81g\xe5V\xf1N\xe6C\x04&=}\x9dv\x97\xf9N\x96\xa8Q\xda\xb9\xba\xaa\xb7\nv\x12\xc8%\xb1\xc4$*\xaf\x98\xbd\xd3\xe8 \"K\xc3\x11\xa8\x93.\x1f\x11\x9fQ\xcebj\xf1d\xc3\x0fO&\xbdR\x93\'\xaa\x99n\x18\n\x82\x8a\xb8\x92F\'\xac\xddEw_\xb7\xd9`2\x161\x9a\xf1\n\x9b\xf1\xeaq\xb7\x0f+\xa0\xe9\x00'/177) 23:17:30 executing program 4: r0 = socket(0x3, 0x2, 0xfffffffffffffffc) r1 = open(&(0x7f0000b91ff9)='./file0\x00', 0x68042, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x77359400}, {r2, r3/1000+30000}}) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x2, 0x4) fallocate(r1, 0x0, 0xffff, 0x9) ioctl$FICLONE(r1, 0x40049409, r1) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000821ff0)={0x2, 0x4e20}, 0x10) sendfile(r0, r1, 0x0, 0x9b4d) sendfile(r0, r1, 0x0, 0x10001) [ 204.372085][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:17:30 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x800, 0x0) r1 = syz_open_dev$adsp(&(0x7f00000000c0)='/dev/adsp#\x00', 0xba83, 0x10200) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)='.\\nodevppp0\xf7\x00', &(0x7f0000000080)='./file0\x00', r1) r2 = socket(0x12, 0x802, 0x4) setsockopt$packet_buf(r2, 0x107, 0x2, 0x0, 0x0) 23:17:30 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) capget(&(0x7f00000000c0)={0x20071026, r0}, &(0x7f0000000100)={0x7, 0x400, 0x10001, 0x2fc1989, 0x1, 0x2}) clone(0x20000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x0, 0x0) setsockopt$inet6_buf(r2, 0x29, 0xdf, &(0x7f0000000180)="96b5bbc80a8caaccd7623646578d75cbaa19a9c76ef9fb090f06616113a1fe7db779e9f9f4a58fa29ba712f6dcd3ddca4ebd2128fa1da1b40d1d930295814aeee56f0a6c2f35a7c74480798def2cd80bc6d1a46fa6f017e07e57986e1a24d4d11c8a812e2507cbd49380d39316124859ddfe4552a0b5b9e4c3a304e1eaf31ed03fddcceea5461a9d482ac011da4357f8bc6469bf55d8896092e47f6b4fd7bf236efe162fd32b6d52e50a11651ab99308", 0xb0) rt_tgsigqueueinfo(r1, r1, 0x800000000016, &(0x7f0000000000)) tgkill(r1, r1, 0x12) 23:17:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)={0x50000000}) socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000000300)=[{&(0x7f0000000600)=""/127, 0x7f}], 0x1) sendto$isdn(r1, &(0x7f00000003c0)=ANY=[@ANYBLOB="9053c0b02a1a1daa0372870cdafb4a67ce74532a926825dcb999ae61f4bac49cbf1d04ff60040000002315c991c215573b6de19e7c8f25580ce42f3c252a58d972c3272d2c38090081cba634e90763422cdc0002ff0fd6fa8fa778d38d58a7d4c45b13950f2e7d7d977dd8ee52acc250573ab7d47e73c5f341cb9becb64ac70d51a50b75806dc7ae62214438cf974c03c1503f900b8709c8a3b8bcbae1d88fc4d6bde8ad61e76c958149c81d7b90585a037fa148a0be61338e71a1f267c7242f0000000000000000000000000000000043a0c7e0bed30ba5b9800fb0c83894331f807526f2d4709fbc6997947d584fa9b9dc4d629ad033934ea3266ae117e1554aefec9a15f4b5ae"], 0x1, 0x10, 0x0, 0x0) r2 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x3ff, 0x40000) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f00000002c0)) syz_genetlink_get_family_id$fou(&(0x7f0000000380)='fou\x00') ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000240)={0x7f, 0x400, 0x140000000, 0x8b0b}, 0x8) getsockopt$inet_dccp_int(r0, 0x21, 0x10, &(0x7f00000001c0), &(0x7f0000000200)=0xffffffffffffff83) 23:17:30 executing program 5: r0 = syz_open_dev$audion(0x0, 0x0, 0x600000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, 0x0, 0x0, 0x10000000002) 23:17:30 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000000)=0x2) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000800c5011, &(0x7f0000000080)) [ 204.819029][ T9864] capability: warning: `syz-executor.0' uses deprecated v2 capabilities in a way that may be insecure 23:17:30 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, &(0x7f0000000040)={0x8, "fbd9998ebb1a34b5"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:17:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0x80) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000356000)=0x1, 0x36d) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x402, 0x40000) ioctl$TIOCSSERIAL(r1, 0x541f, &(0x7f0000000240)={0x8, 0x80000000, 0x3, 0x8, 0x74589676, 0x100000000, 0x3, 0x7, 0x3ff, 0x71, 0x4, 0x1, 0xffffffff, 0xe0, &(0x7f00000008c0)=""/4096, 0x3, 0xfffffffffffffffa, 0x7f}) r2 = syz_open_dev$sg(0x0, 0x0, 0x400001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x42, &(0x7f0000000400)={@broadcast, @broadcast, [{}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x3, 0x4, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) ioctl$TIOCSISO7816(0xffffffffffffffff, 0xc0285443, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xab3}) ioctl$SG_SET_COMMAND_Q(r2, 0x2271, &(0x7f0000000140)=0x1) connect$inet6(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0xfffffffffffffdcb) connect$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x6000, 0x0) write$capi20_data(r3, &(0x7f00000000c0)={{0x10, 0x40, 0xff, 0x82, 0x2, 0x5}, 0x6, "f4a436c30901"}, 0x18) sendmmsg$inet(r0, &(0x7f0000003ac0)=[{{0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000080)="e1", 0x1}], 0x1}}], 0x1, 0x4000841) 23:17:30 executing program 1: ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x20000, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000380)={{0x101, 0x4, 0x2, 0x9, 0x1, 0x842}, 0x7b00000000000000}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={&(0x7f0000000040)=@can={0x1d, r0}, 0x80, 0x0}, 0x0) r2 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(r2, &(0x7f0000000100)={&(0x7f00000001c0)=@nfc={0x27, 0x3}, 0x5d, &(0x7f00000000c0)=[{&(0x7f0000000280)="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", 0x28}], 0x934e2779a519542e}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000140)={'bond_slave_1\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) 23:17:31 executing program 4: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000500)=@nat={'nat\x00', 0x19, 0x3, 0x0, [0x20000140, 0x0, 0x0, 0x2000027e, 0x200002ae], 0x0, 0x0, 0x0}, 0x78) 23:17:31 executing program 5: getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) ioctl$IOC_PR_RELEASE(0xffffffffffffffff, 0x401070ca, &(0x7f00000007c0)={0x0, 0x8}) mkdir(0x0, 0xe0) syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x8, 0x0) syz_open_dev$vbi(&(0x7f00000003c0)='/dev/vbi#\x00', 0x1, 0x2) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) r0 = syz_open_dev$swradio(&(0x7f0000000600)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$l2tp_PPPOL2TP_SO_REORDERTO(r0, 0x111, 0x5, 0xfffffffffffffff8, 0xfe82) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ubi_ctrl\x00', 0x800217ffe, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, 0x0) unshare(0x8020000) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3, &(0x7f0000000800)=0x4, 0x9, 0x3) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = semget$private(0x0, 0x3, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000180)={0x18, 0x1, 0x0, {0x7fffffff}}, 0x18) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f0000000300)) open$dir(&(0x7f0000000080)='./file0\x00', 0x200000, 0x80) fdatasync(0xffffffffffffffff) ioctl$UDMABUF_CREATE_LIST(r1, 0x40087543, &(0x7f0000000680)=ANY=[@ANYBLOB="0100000009000000", @ANYRES32=r1, @ANYBLOB="000000000000000100000000b600000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000001000000000020000000000000", @ANYRES32=r1, @ANYBLOB="00000000000000f0ffffffff0080000000000000", @ANYRES32=r1, @ANYBLOB="000000000000000000000000000000f0ffffffff", @ANYRES32=r1, @ANYBLOB="0000000000f0ffffffffffff00f0ffffffffffff", @ANYRES32=r1, @ANYBLOB="00000000264c2865f14f331b00f0ffffffff0000", @ANYRES32=r1, @ANYBLOB="00000000000000f0ffffffff270d1485cc0abcbc", @ANYRES32=r1, @ANYBLOB="0000000000f0ffff0000000000f0ffff00000000", @ANYRES32=r1, @ANYBLOB="0000000000f0ffffffffffff00f0e03a4685ef86"]) semop(r2, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) r3 = syz_open_procfs$namespace(0x0, &(0x7f0000000140)='ns/ipc\x00') setns(r3, 0x0) getgroups(0x3, &(0x7f00000004c0)=[0x0, 0x0, 0x0]) r4 = shmget(0x0, 0x1000, 0x78000000, &(0x7f0000fff000/0x1000)=nil) shmat(r4, &(0x7f0000ffe000/0x2000)=nil, 0x1000) r5 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000001c0)="217abececb921e6aa2ff89da3ad28017cef96648dee38d5d951a99650738989a9e7ad3fdd30ae2a4c84576c2035d6642a6919ea4615b4a5ffbae4b1e957da578b1bdf77321b36b1a7bb290dfee2a0e4306f03d4301938ee57571ecb8de18f87e0547f709414749c2ee1b7d6252fe3fb93669a911fb62b1f9650f39efde0c695a5313e5cc3e837d73362aa0ee5b84602a0d40d8323c4e2528a7818db7561a3fd2f6ba551ae14b734ce03c6adaaac461b41897abebb0b539154a2aef1efb11cdb9fe9a48f0ccfeaf415e9de7c57c", 0xcd, 0xfffffffffffffffc) keyctl$describe(0x6, r5, &(0x7f00000000c0)=""/25, 0x19) getsockopt$IP6T_SO_GET_INFO(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000440)={'mangle\x00'}, &(0x7f0000000640)=0x54) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000780)=@req={0x100000000, 0x5a, 0xc0, 0x3}, 0x10) execve(0x0, &(0x7f0000001040)=[&(0x7f00000008c0)='TIPC\x00', &(0x7f0000000900)='%--\x00', &(0x7f0000000940)='system_u:object_r:pam_var_run_t:s0\x00', &(0x7f0000000980)='\r\x00', &(0x7f00000010c0)='systemuser[bdev\x00', &(0x7f0000000a00)='security.capability\x00', &(0x7f0000000a40)='security.capability\x00', &(0x7f0000000f80)='TIPC\x00', &(0x7f0000000fc0)=']\x00', &(0x7f0000001000)='em1\x00'], 0x0) 23:17:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x2e3, 0x0) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000080)) mount$fuse(0x0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000000440)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) 23:17:31 executing program 0: setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, &(0x7f00000001c0)=0x8, 0x4) setxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)='security.capability\x00', &(0x7f0000000040)=@v2, 0x14, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f0000227f74)=""/140, 0xffffffffffffff29) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f00000000c0)={0x0, 0x5}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000140)={0x3, 0x8000, 0x5, 0x3f, r1}, 0x10) 23:17:31 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) uname(&(0x7f0000000240)=""/84) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, 0x5, &(0x7f0000000140)={0xec}, 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3c0000001000f9ff00"/20, @ANYRES32=0x0, @ANYBLOB="00001900000000bf1c0012000c00010067726574617000100c00020008000e0007000000"], 0x3c}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_ro(r2, &(0x7f0000000180)='memory.stat\x00', 0x0, 0x0) ioctl$UI_END_FF_ERASE(r2, 0x400c55cb, &(0x7f0000000040)={0x6, 0x8, 0x3f}) 23:17:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000380)) 23:17:31 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000040)={{}, {}, 0x800000000008}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000000)={0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f00000000c0)={r1, 0x80000, r0}) lgetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='system.posix_acl_access\x00', &(0x7f00000001c0)=""/68, 0x44) ioctl(r0, 0xffffffffffffffb2, &(0x7f0000000040)) [ 205.658367][ T9913] netlink: 'syz-executor.3': attribute type 14 has an invalid length. 23:17:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet6(0xa, 0x3, 0x9) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x36, &(0x7f0000000000)=@routing, 0x8) pwritev(r1, &(0x7f0000000180)=[{&(0x7f0000000080)="2e770f0a96141c0b177ed557cd84313251c062c4efa5558dd6fc1476e5b4fce5af8c7527609aedbdbe7ce05cb64eaef4c44161f93587ff93484bcabd3d13d8a7ce48fec2c648bb1d3a88f736570101e968f524fe84d8fd3abc5dbc1dea433e09f66c", 0x62}, {&(0x7f0000000140)="89a89b6cda075b80db57cef6b9d3466ef597620da31a", 0x16}], 0x2, 0x0) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000174, 0x0) 23:17:31 executing program 1: socket(0x200840000000015, 0x805, 0x0) 23:17:31 executing program 0: r0 = socket(0x200040000000015, 0x805, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000000)) getsockopt(r0, 0x114, 0x2, 0x0, &(0x7f0000000180)) 23:17:31 executing program 3: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000040)=@assoc_id=0x0, &(0x7f0000000200)=0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x200, 0x0, 0x9, 0x4, r2}, &(0x7f0000000300)=0x10) close(r1) r3 = openat$cgroup_ro(r0, &(0x7f0000000240)='rdma.current\x00', 0x0, 0x0) r4 = syz_open_dev$amidi(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x10, 0x800000000000803, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000000)) sendto(0xffffffffffffffff, &(0x7f0000000100), 0xff77, 0x20040880, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001900)=[{{0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000100)=""/238) readv(r1, &(0x7f00000002c0), 0x18f) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010425bd7000fcdbdf2504800000440004001c0007000800030000000000080001001b00000008000200080000000c00010073797a30000000000c000700080004004000007e3616dfd535a9000c00070008"], 0x58}, 0x1, 0x0, 0x0, 0x40}, 0x20000000) 23:17:31 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x6, 0x0) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) r1 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0xffffffff00000002, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$IOC_PR_REGISTER(r2, 0x401870c8, &(0x7f0000000040)={0xffffffffffffdd94}) 23:17:31 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@initdev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000240)=0xe8) recvfrom(r0, &(0x7f0000000040)=""/177, 0xb1, 0x120, &(0x7f0000000280)=@can={0x1d, r1}, 0x80) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x7f6, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) signalfd(r0, &(0x7f0000000300), 0x8) ppoll(&(0x7f0000000000)=[{r0}], 0x1, 0x0, 0x0, 0x0) 23:17:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000007c0)={'vcan0\x00'}) connect(r1, &(0x7f0000000100)=@in={0x2, 0x4e20, @rand_addr=0x9}, 0x12c) sendmsg$can_bcm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="010000000800000000000000000000002a677946fe7fab1c24df5145c4223ab43a7a49f7ae624ff9f5faa680fc767c8e603b9034023d675d6e64758808c0f026ca7b1f9905c00aec71bc2e", @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000010000000000000000000000a0440a32e9cd1c14"], 0x48}}, 0x0) 23:17:31 executing program 1: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x0, 0x0) accept$packet(r1, &(0x7f0000000540)={0x11, 0x0, 0x0}, &(0x7f0000000580)=0x14) sendmsg$sock(r1, &(0x7f00000008c0)={&(0x7f00000005c0)=@ll={0x11, 0x3, r2, 0x1, 0x3efd1f8a, 0x6, @local}, 0x80, &(0x7f0000000800)=[{&(0x7f0000000640)="7c0f827d576b8b6b695054d0a5dacf2ec1c6728f50f954535c3f15b7df06e59c6799922720c18f121304d073aac2526fbf3506f048ac7ebdd97736e863db040b015cca142ab611557f3faa6e23f25374ad9d7958b26b6d2b94e14aaff8ef97fa0f456c59b608ba89acd0ada3d1e1821d48b4dff3b4fe32503d364e6386b07ec74dadce6704d2dc80c08c2978a1eb8ee28f5045e88b507622ee527e3e904d0e9f85a95c", 0xa3}, {&(0x7f0000000700)="c069d2fabb82955370a2bdaacafa12c74c6959f92520a0fe4ffcef531f1a9652a182e4e1672bf222072915eaf6bd1cbe1f89886320211e884fa216a394fd70c620ba196002397af08abbd1e0c9a8effef445641ddca315cfb7cbf5027d466346d6a01ebeffaa7934712e08b012490a84c07595db1486c7d14232833c7f71e203d91a7fc28eb811aaedf3a3ffeff9d1d33c7450d6b95be5e00e08844135813a2e013e82852000b4d060afafc2dd0577e4e02af22625d8ba59f0160d7d105888acf38757663b2626cab6ac1a767b06042060fb", 0xd2}], 0x2, &(0x7f0000000840)=[@timestamping={{0x14, 0x1, 0x25, 0x7}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @timestamping={{0x14, 0x1, 0x25, 0x100000000}}, @mark={{0x14, 0x1, 0x24, 0xfff}}], 0x60}, 0x20000000) ioctl$EVIOCGKEY(r1, 0xc0487c04, &(0x7f0000000000)=""/226) socket$rxrpc(0x21, 0x2, 0xa) fchmod(0xffffffffffffffff, 0x20) bind$rxrpc(0xffffffffffffffff, 0x0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) close(r0) eventfd(0x0) fdatasync(0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) listen(0xffffffffffffffff, 0x0) syz_open_dev$rtc(&(0x7f00000016c0)='/dev/rtc#\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000100)=0x6, 0x4) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) sendmsg$xdp(0xffffffffffffffff, 0x0, 0x0) 23:17:31 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cgroup.clone_children\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r1}) ioctl$sock_inet6_udp_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) sendfile(r1, r1, 0x0, 0x1) 23:17:32 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x0, 0x0}, 0x10) sendto$inet(r0, 0x0, 0x223, 0x200007fa, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x8002, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x1000, "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"}, &(0x7f0000000000)=0x1008) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={r1, 0x48, &(0x7f0000000040)=[@in6={0xa, 0x4e21, 0xb2d, @remote, 0x1}, @in6={0xa, 0x4e22, 0x101, @empty}, @in={0x2, 0x4e22, @multicast1}]}, &(0x7f0000001200)=0x10) 23:17:32 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x200) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x290f7b95afa4a070, 0xffffffff, 0x4, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000000c0)={r2, 0x2, 0x2, [0x2, 0x400]}, &(0x7f0000000100)=0xc) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) keyctl$get_keyring_id(0x13, 0x0, 0x0) bind$isdn_base(r1, &(0x7f0000000140)={0x22, 0x6af, 0x400, 0x2, 0x2}, 0x6) 23:17:32 executing program 4: r0 = socket(0x10, 0x2, 0xc) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) ioctl$RTC_IRQP_SET(r1, 0x4008700c, 0xd99) write(r0, &(0x7f0000000100)="1f0000000104ff00fd4354c003110000f305010008000100010423dcffdf00", 0x1f) syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x2, 0x400) write(r1, &(0x7f0000000000)="1f0000000104fffffd3b542407110000f30501000b000600000000000200cf", 0x1f) openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x20001, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x8003, 0x184) [ 206.633057][ T9972] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. [ 206.730804][ T9972] netlink: 3 bytes leftover after parsing attributes in process `syz-executor.4'. 23:17:32 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x200000000003e) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000700)={0x10, 0x30, 0xfa00, {0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x38) read$eventfd(r0, 0x0, 0x6) 23:17:32 executing program 3: r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/ip_vs\x00') write$P9_RSETATTR(r1, &(0x7f00000000c0)={0x7, 0x1b, 0x1}, 0x7) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) keyctl$invalidate(0x1d, r0) 23:17:32 executing program 1: shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffa000/0x4000)=nil) shmget(0x0, 0xb000, 0x0, &(0x7f0000ff5000/0xb000)=nil) r0 = shmget$private(0x0, 0x4000, 0x100, &(0x7f0000ff3000/0x4000)=nil) shmctl$IPC_RMID(r0, 0x204) 23:17:32 executing program 4: r0 = socket$kcm(0x2b, 0x200000000002, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) flistxattr(r0, &(0x7f0000000000)=""/231, 0xe7) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) close(0xffffffffffffffff) 23:17:32 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(streebog256-generic,cbc(aes-aesni))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="04006784", 0x4) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000000c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r2, 0x0, 0x70bd2b, 0x25dfdbfb, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0xfffffffffffff086}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) 23:17:32 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0xfffffffffffffe48, &(0x7f0000000200)={&(0x7f0000000000)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_ADDRESS={0xa, 0x1, @dev}]}, 0x40}}, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x800, 0x240) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000080)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f00000000c0)=r2) 23:17:32 executing program 4: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000001180)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f0000000200)}, 0x10) 23:17:32 executing program 1: shmctl$SHM_LOCK(0x0, 0xb) msgget(0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) ptrace$poke(0x5, r0, &(0x7f0000000000), 0x0) 23:17:32 executing program 3: r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0xb5, 0x800) ioctl$LOOP_CLR_FD(r0, 0x4c01) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r1, r2, 0x0) pipe2(&(0x7f0000000000), 0x4000) 23:17:33 executing program 5: r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00001da000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xe05000) mq_open(0x0, 0x0, 0x0, &(0x7f0000000040)={0x80000001, 0x8001, 0x0, 0x80, 0x1, 0x0, 0x9}) r4 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r4, 0xc0045516, &(0x7f0000000100)=0x9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x50, 0x0, 0x0) ioctl$KVM_GET_DEBUGREGS(r4, 0x8080aea1, &(0x7f00000001c0)) ioctl$KVM_RUN(r0, 0xae80, 0x0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) 23:17:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 23:17:33 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x53, 0x40200) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth1_to_bridge\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2000, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0xffffffffffffff96) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) 23:17:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000640)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\xe3\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\x00\x87\xac\xad\x80\xa3P\x8c\xea\x17f%;\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80\x1d\x95WM\x9a\xc6\x95\x98\xed\xe9\xca\x9e\xe6\xcb\x8e\xef\xf659-\xef\xb5\xc9\xf2\"\x15\xb39T\x81\x19\xcc\xcd\xb5\r\x10G\x16(~\x15\xd1\xde\x9e\xb1s\xa0\x864hb\xaa\xa3\x18V\x17xE\xbd\xc2QD\xa5P\x0f\x8e\x1f\x888\xb6\xee\xc6N\xd2\x136\xeb\xa4\x1d\xaap\xc6\x9e\xdc\x007h\f\x96g\"_\xb1\x1b\xdb\x86\xc6\xc9\xb1\xcc\xa1\x9f\xd8h\xcc\x12\xf1k\xe8\x86:D\xd2\xd1\x02I\xfe\x96t\xe5C\x86)\xf0M\xc4\xa35\xcc\x9b\x9e\xbb5\x18[\x958D\\~3\xcaO\x97M\xaf\x930\xfd\x13\xa3\xde\xce0\x1d5I\xba\xc5;T\xdc\xaf\xc8\xa6\n\x92\x0e6>\x19*') r1 = openat$cgroup_ro(r0, &(0x7f0000000780)='mem\x00rrenu\x002\x00\x00\x00\x00\x00\xee\x14[\xdf}I1g\v\xa4\xbd\xa7\x95\x12\x15\xf1KWQ\xae\a\xc8)v4\"\xa2qk\xc3\x9d\xf5\x9d\xc1r\xaf\xbc\xc46\xbc\xf2\x92@\xe9t\x01\xccJ\x7f\x19C>s\xecR&\fF^\xe0\x1d\x94\x80K\xfa\xa2\x16\xe74T\xb4\xb1\x13A\xbf6\x18\x9eb\x80rM\x0f\x9f\x18U\xf7\x1b\xee\xa8\xd1\x1c\n\xe8\xda\x96;\x1d\xa1\x11\x1a\x9aLX\xca\xd4\x1c\x1cc$\xb9\x98}\xf7\xb2\x1d\x13=6e!<\xe9s\xf4\xb1\x8b\x81,\xb7\xb5Z\x1d:\xc3t\xb9\xd5.O|\x95\x8e\xc4\x7f\xbaj\xda\x03KO\x82\xbb\xe3\x1d\xcf\xd7J\x81J@\xe0\xf5\xd4 A\xc5$\xc4U\xc29\x94\x9e\xac\x92i0x0, @in6={{0xa, 0x4e23, 0x0, @loopback}}}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f00000000c0)=r1, 0x4) 23:17:33 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x1, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffeffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x500, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x40, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_QUERYMENU(r2, 0xc008561c, &(0x7f0000000080)={0x20208000001, 0x7f, @name="40010697251855428f3dcea5e746102a864f579783dabe315a9b514ae927b5a2"}) ioctl$ASHMEM_GET_SIZE(0xffffffffffffffff, 0x7704, 0x0) 23:17:33 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x53, 0x40200) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'veth1_to_bridge\x00'}) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x2000, &(0x7f0000000200)={0xffffffffffffffff}, 0x13f}}, 0xffffffffffffff96) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000080)) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000280)={0x1, 0x10, 0xfa00, {&(0x7f00000001c0), r2}}, 0x18) 23:17:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f00000000c0)={0x7, 0x200, 0xe5, 0x7f, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r2, 0x84, 0x5, &(0x7f0000000140)={r3, @in6={{0xa, 0x4e24, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x7}}}, 0x84) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000040)) 23:17:33 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200100, 0x82) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x60, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x79d3, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f00000000c0)={{0x3, 0x2, 0x4, 0x2, 0x5}, 0x4, 0x800, 0x800}) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000000)=""/37) mremap(&(0x7f00000c7000/0x1000)=nil, 0x1000, 0x4000, 0x3, &(0x7f0000bb2000/0x4000)=nil) 23:17:33 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'michael_mic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r1 = accept$alg(r0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x9, 0x80000) ioctl$RTC_WIE_ON(r2, 0x700f) sendmsg$alg(r1, &(0x7f00000004c0)={0x10000000, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xf0ff7f}], 0x1}, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000002c0)='/dev/loop#\x00', 0x0, 0x0) r5 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x85nG\x13g\xa6\x05', 0x0) pwritev(r5, &(0x7f0000000340)=[{0x0}], 0x0, 0x81805) sendfile(r3, r4, 0x0, 0x20002000005) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000380)=ANY=[@ANYBLOB="00007dd7", @ANYRES16=r6, @ANYBLOB="000427bd7000fbdbdf251200000038000500080001007564700008000100696200000c000200080001001f0000000c0002000800010014000000040002000800010065746800"], 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0xc0) ioctl$LOOP_CHANGE_FD(r4, 0x4c06, r5) setsockopt$TIPC_MCAST_BROADCAST(0xffffffffffffffff, 0x10f, 0x85) ioctl$LOOP_CLR_FD(r4, 0x4c01) r7 = socket$inet6(0xa, 0x1000000000002, 0x0) r8 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) connect$inet6(r7, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x9}, 0x1c) timer_settime(r9, 0x0, &(0x7f0000000480)={{0x0, 0x8}, {0x77359400}}, 0x0) r10 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r10, &(0x7f00000001c0)={0xc, 0x8, 0xfa0e, {0x0}}, 0x10) r11 = dup3(r7, r10, 0x0) fsync(r11) tkill(r8, 0x1002000000016) r12 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet6_udp_int(r12, 0x11, 0x0, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r12, 0xc01064b5, &(0x7f0000000100)={&(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7}) write$P9_RAUTH(r12, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x4, 0x1, 0x1}}, 0x14) 23:17:33 executing program 2: io_uring_setup(0x42e, &(0x7f0000000040)={0x0, 0x0, 0x6, 0x1, 0x185}) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/pid\x00') setns(r0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0xa40, 0x0) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000200)=0x7) bind$can_raw(r0, &(0x7f0000000140)={0x1d, r1}, 0xfffffffffffffd84) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r3, 0x6, 0x21, &(0x7f0000000180)="3a4a1ff5c0fa21de92a339077340b5b5", 0x10) 23:17:33 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x12002, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f0000000080)={r1}) r2 = socket(0x10, 0x803, 0x0) ioctl$NBD_CLEAR_QUE(r0, 0xab05) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@bridge_delneigh={0x1c, 0x1d, 0x1}, 0x1c}}, 0x0) 23:17:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x300036, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x300028, 0x0, 0x0, @ipv4={[0x300006], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000080)={{0x2, 0x4e22, @multicast2}, {0x6, @remote}, 0x4, {0x2, 0x4e20, @rand_addr=0x2}, 'caif0\x00'}) 23:17:34 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 23:17:34 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r1, 0x40085511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000140)=""/110) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0xc5, "bc7889233b8ffd4072e6dd9796f4ced78bd71603f7f1e0a1ddfa2bc5c6becfcdb26272f3c01747d196d49622cc34dcf4dcdb902031a0091c0f6ab565ab4c76c3948105a15e77f9982ec149a8dfdd552955cb47b57e21c204d82311a8aa05559fc0286ae66b3ff383c07c79e5326406fe6182ab7c54121ff419788f68d291e6372e43098c735e1507d062ea4054a5f21ff7e244514342deee1e80b1318e5a2a1832c64e2614d704111870d12ce911e78a700144c4875a1a1e78df5ad0f6b93191add842c594"}, &(0x7f0000000100)=0xcd) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x2, 0x8, 0x1, 0x7, 0x6, 0x6, 0xfffffffffffff800, 0x101, r4}, 0x20) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x2, @in=@loopback, 0x0, 0x4}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 23:17:34 executing program 4: r0 = socket(0x1e, 0x1, 0x0) fcntl$setlease(r0, 0x400, 0x1) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) recvfrom$inet(r0, &(0x7f0000000180)=""/4096, 0x1000, 0x0, 0x0, 0x2d4) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x400, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000100)={0x1a, 0x3, 0x2}) write$binfmt_elf32(r0, &(0x7f0000001600)=ANY=[@ANYBLOB="7f454c460000004100f758b781e312cdb9000000000000000000000038000000000000000000000000002000"/88], 0x58) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000140)=0xe401) 23:17:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket$packet(0x11, 0x40800000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000500)={'syz_tun\x00', 0x0}) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0xc00, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r3, 0xc040564a, &(0x7f0000000240)={0x8001, 0x0, 0x301b, 0x100000001, 0x400, 0xd5, 0xfff, 0x1}) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f0000000280)=0x2, 0x4) r4 = dup2(r0, r1) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r4, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r5, 0x4, 0x70bd26, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4000040) bind$packet(r1, &(0x7f0000000140)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @local}, 0x14) ioctl$DRM_IOCTL_INFO_BUFS(r3, 0xc0106418, &(0x7f00000002c0)={0x5, 0x9, 0x6, 0x9, 0x12, 0x3}) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="0180c20000000000000010001400ac1e000018009078ac141faa0000000e40000000"], 0x0) 23:17:34 executing program 0: unshare(0x8000400) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0xfffffccd) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) setsockopt$inet_mreq(r0, 0x0, 0x20, &(0x7f0000000040)={@multicast2, @broadcast}, 0x8) 23:17:34 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000000)={'raw\x00', 0x4, [{}, {}, {}, {}]}, 0x68) shutdown(r0, 0x0) recvmmsg(r0, &(0x7f0000000100), 0xc6, 0x0, 0x0) 23:17:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000000)=0x3, 0x4) sendto$inet6(r1, 0x0, 0xffffffffffffffd1, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x400000000004e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x152) close(r1) [ 208.903365][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:17:34 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) [ 208.944959][ C1] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:17:36 executing program 5: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r1 = socket$kcm(0x2b, 0x5, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) keyctl$unlink(0x10, r0, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x20100) r3 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) 23:17:36 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="1800f1000400000000000000100000002509"], 0x12}}], 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x3000)=nil, 0xfffffffffffffffd) r0 = memfd_create(&(0x7f0000000340)=']\'\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x1, 0x11, r0, 0x0) rt_sigaction(0x7, &(0x7f0000b4a000)={0xfffffffffffffffd, {0xfffffffffffffe00}, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000040)) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='auxv\x00') getsockname$netlink(r1, &(0x7f0000000080), &(0x7f00000000c0)=0xc) 23:17:36 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000000)=0x3, 0x4) sendto$inet6(r1, 0x0, 0xffffffffffffffd1, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x400000000004e22}, 0x1c) sendto$inet6(r1, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x152) close(r1) 23:17:36 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r1, 0x40085511, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r3 = socket$l2tp(0x18, 0x1, 0x1) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000140)=""/110) connect$l2tp(r3, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f00000002c0)={0x0, 0xc5, "bc7889233b8ffd4072e6dd9796f4ced78bd71603f7f1e0a1ddfa2bc5c6becfcdb26272f3c01747d196d49622cc34dcf4dcdb902031a0091c0f6ab565ab4c76c3948105a15e77f9982ec149a8dfdd552955cb47b57e21c204d82311a8aa05559fc0286ae66b3ff383c07c79e5326406fe6182ab7c54121ff419788f68d291e6372e43098c735e1507d062ea4054a5f21ff7e244514342deee1e80b1318e5a2a1832c64e2614d704111870d12ce911e78a700144c4875a1a1e78df5ad0f6b93191add842c594"}, &(0x7f0000000100)=0xcd) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f00000003c0)={0x2, 0x8, 0x1, 0x7, 0x6, 0x6, 0xfffffffffffff800, 0x101, r4}, 0x20) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@local, @in, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in, 0x0, 0x32}, 0x2, @in=@loopback, 0x0, 0x4}}, 0xe8) sendmmsg(r3, &(0x7f0000005fc0), 0x800000000000059, 0x0) 23:17:36 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300)}}, 0xfffffea9) 23:17:36 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getgid() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[r1, r2]) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80800) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000040)={0x2, [0xffffffff, 0x3]}, 0x8) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x204000, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890c, &(0x7f00000001c0)={0x0, {}, {0x2, 0x0, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}) [ 211.203809][ C0] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 23:17:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x17) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x8e7c, 0x4) r1 = syz_open_dev$dri(&(0x7f0000000100)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(0xffffffffffffffff, 0x40505330, &(0x7f0000000200)={{0xfffffffffffffffe}, {0x40000}, 0xfff, 0x1, 0x2}) ioctl(r1, 0xfffffffffffffffc, &(0x7f0000000140)="918833d878aa51b5656695fd833615481835aef359c4051fb13b4416896fa7edd2f1cb3678f4097d180ecdf391e9f62790e432b60db01a4e889d21fb011a35c7c2c3e3ccfa5f9b012febd0365206be24bfafce8e94abacbe368a167f3c64607c50bba865736336a04a278707fdf9655404daa2e732ac01fedb670c7e0fb298d072c6950c527cb4bae4aff396f8fa419d75d1493319f2bb704075a90df971becca04ffd5a166ddacbf692cd83f1144632fed3a7f5e27f7eb8ba42f48a2621") openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video37\x00', 0x2, 0x0) 23:17:37 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={0xffffffffffffffff, 0x9eff, 0x8}, 0xc) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="240000001a0007041dfffd946f610500020000001f000000000008000800030004000000", 0x24}], 0x1}, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2b, &(0x7f0000000080)={0x5, {{0x2, 0x4e22, @broadcast}}, {{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x2a}}}}, 0x108) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000240)={0xf33, 0x9a, 0x3ff, 0x4, 0xffffffffffff7fff}) 23:17:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000100)={0xc02f}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, 0x0, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x8, @empty, 0xfffffffffffffffa}, 0x1c) pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000058, 0x0) accept4$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', r3}) 23:17:37 executing program 0: readlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000003380)=""/4096, 0xdad3c4b3c0d47485) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='.\x00', 0x0, 0x0) futimesat(r1, &(0x7f0000000000)='./file1\x00', &(0x7f0000000280)) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r1, 0xc0285628, &(0x7f00000001c0)={0x0, 0x7, 0xd2, [], &(0x7f00000000c0)=0x8001}) renameat2(r0, &(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000080)='./file1\x00', 0x2) 23:17:37 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="01000000000000000000030000004c00010038000400200001000a00000000000000ff000000000000000000000000000001000000001400020002000000d214140fdabad65031095400100001007564703a73797a3100000000a76a138858f60a34a00c4ad68c49d956cf03c6b56dce7bfcd36a727bae19a687fe6fde47"], 0x60}}, 0x0) ioctl$sock_SIOCDELDLCI(r0, 0x8981, &(0x7f0000000000)={'bond0\x00', 0xcac}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20ncci\x00', 0x40, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x63, &(0x7f0000000140)={'ipvs\x00'}, &(0x7f0000000180)=0x1e) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r2, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000200}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, r3, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xa05}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x8d}, 0x1, 0x0, 0x0, 0x844}, 0x20000000) 23:17:37 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:37 executing program 2: r0 = memfd_create(&(0x7f0000000280)='\x02@\x94\xb8\x03P\xcaC\x8a\xf9\x16.H\x80\'\xc5\x8d\xab\xf9\x1b@\xd6\xea\xd24\x95\x94\x165\x8f\x18H\xdc\xc9\x98M\xf9\x8d\xcdmp\xf8h\x8fZV\x16\x83\xf1\xa6-c\xcbQ#\'O\xb9\xbb\xe5\xf3P\xf1\x81\xf7\na\v:\xca\xdc\xe9yb\xb9\xc7p\x92\x8b\xe9\xfdEWW\xad\xd50\xd27\x13\xc1\x7fXo\xf3\x92', 0x4) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c460000d297d564965214980000030006000000000000000000380000000000000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000eaffffff0000008000"/120], 0x78) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/184}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 23:17:37 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x24a01, 0x0) 23:17:37 executing program 0: r0 = fsopen(&(0x7f0000000900)='cgroup\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="11dca50d5e0bcfe47bf070") fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='nolazytime\x02', 0x0, 0x0) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000040)) [ 211.990567][T10178] QAT: Invalid ioctl [ 212.025224][T10178] ERROR: Domain ' /sbin/init /etc/init.d/rc /sbin/startpar /etc/init.d/ssh /sbin/start-stop-daemon /usr/sbin/sshd /usr/sbin/sshd /bin/bash /root/syz-fuzzer /root/syz-executor.2 proc:/self/fd/3' not defined. 23:17:37 executing program 3: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$SG_GET_COMMAND_Q(r0, 0x2270, &(0x7f0000000140)) prlimit64(0x0, 0x7, &(0x7f00000000c0), 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400800, 0x0) ioctl$CAPI_GET_MANUFACTURER(r1, 0xc0044306, &(0x7f0000000100)=0x4) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4040, 0x110) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000040)={0x5, 0x34325241, 0x4, 0xbb9, 0x0, @discrete={0x7ff, 0x7}}) epoll_create1(0x0) 23:17:37 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x29, 0x44, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 23:17:37 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) [ 212.235994][T10178] QAT: Invalid ioctl 23:17:38 executing program 0: 23:17:38 executing program 3: 23:17:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_BIND(r1, &(0x7f00000003c0)={0x14, 0x88, 0xfa00, {0xffffffffffffffff, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @rand_addr="5362f47117da45f6108aa04887648202"}}}, 0x90) 23:17:38 executing program 4: 23:17:38 executing program 2: 23:17:38 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 23:17:38 executing program 0: 23:17:38 executing program 2: 23:17:38 executing program 4: 23:17:38 executing program 5: 23:17:38 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:38 executing program 0: 23:17:38 executing program 3: 23:17:38 executing program 4: r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/udmabuf\x00', 0x2) ioctl$UDMABUF_CREATE_LIST(r0, 0x40087543, &(0x7f00000001c0)=ANY=[@ANYBLOB="b73182dfb629"]) 23:17:38 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") getsockopt$inet6_opts(r1, 0x29, 0x14000000008, 0x0, &(0x7f0000000040)=0xfffffffffffffdd7) 23:17:38 executing program 5: r0 = creat(&(0x7f0000000200)='./file0\x00', 0x81) write$cgroup_type(r0, &(0x7f0000000180)='threaded\x00', 0x3d3427e) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000140)={0xffffffffffffffff}, 0x13f, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000240)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e20, 0x1ff, @loopback, 0x5}, r1}}, 0x30) getresuid(&(0x7f0000000380), &(0x7f00000002c0), &(0x7f0000000100)) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000)='bdev\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@dev}, 0x0, @in=@local}}, &(0x7f0000000040)=0xe8) wait4(0x0, 0x0, 0x80000009, 0x0) 23:17:38 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) io_setup(0xb1, &(0x7f0000000280)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_getevents(r1, 0x0, 0x1, &(0x7f0000000300)=[{}], 0x0) 23:17:38 executing program 4: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) accept4$packet(r0, &(0x7f0000000080), 0x0, 0x0) ioctl$ASHMEM_GET_PIN_STATUS(0xffffffffffffffff, 0x7709, 0x0) pwritev(r0, &(0x7f0000000380), 0x0, 0x0) socket$packet(0x11, 0x82, 0x300) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x40) futex(&(0x7f0000000240)=0x1, 0x800000000006, 0x0, 0x0, 0x0, 0x0) restart_syscall() socketpair(0x10, 0x6, 0x0, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) ptrace$cont(0xffffffffffffffff, 0x0, 0x4, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) futex(0x0, 0x9, 0x1, &(0x7f00000002c0), &(0x7f0000000300), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f00000001c0)={@loopback, @broadcast}, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f00000005c0)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\x94a\xac', 0x3) write$binfmt_misc(r1, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) fcntl$addseals(r1, 0x409, 0x8) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 23:17:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:38 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x0, 0x0, 0x3fffffff, 0xa, 0x0, 0x1064}}) 23:17:39 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000340)='-B\xd5NI\xc5j\xbappp\xf0\b\x84\xa2m\x00:)\x00\xbb\x8d\xac\xacva}knh#\xcb)\x0f\xc8\xc0:\x9cc\x10d\xee\xa9\x8bCc\xad\x89\x9ck\xde\xc5\xe96\xddU\xa9=\xcdJx\xaa\x8f~\xb90a\xa9\xb2\x04K\x98\x93?\x88Q\xf7\xd6\x1d\xa1\xce\x8b\x19\xea\xef\xe3\xab\xb6\xa5$4\xd6\xfe7\x0f\xe7\xd9$\xce \xabN\xae\xc9\xbd\xd3g@\xe1\'s\x0e\x90\xf2\xcdr\xb8(', 0x0) write(r0, &(0x7f0000000080)="b156d417452c8f6d46ed", 0xa) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0x11, r0, 0x0) sendfile(r0, r0, &(0x7f0000000200), 0xff8) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:17:39 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) mprotect(&(0x7f0000007000/0x4000)=nil, 0x4000, 0xd) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x19) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) write$binfmt_misc(r0, &(0x7f0000000200)=ANY=[], 0xffdc) read(r0, &(0x7f0000000380)=""/165, 0x101d7) 23:17:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) [ 213.505169][T10284] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 23:17:39 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:39 executing program 3: r0 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000100)=""/182) 23:17:39 executing program 2: mknodat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x800000000040, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) sched_setaffinity(0x0, 0xdb, &(0x7f00000000c0)=0x9) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r1, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r1, 0x5501, 0x0) gettid() timer_create(0x0, &(0x7f0000044000), 0x0) socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000fff000/0x1000)=nil) fcntl$getown(0xffffffffffffffff, 0x9) dup2(r0, r1) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) 23:17:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:39 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000080)='veno\x00', 0x5) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) [ 213.901394][T10301] input: syz1 as /devices/virtual/input/input10 [ 213.968089][T10306] input: syz1 as /devices/virtual/input/input11 23:17:40 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x16, 0x5) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000140)) 23:17:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) ppoll(&(0x7f0000001980), 0x0, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) remap_file_pages(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0) 23:17:40 executing program 3: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c65, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000001380)='eth0\x00', 0x42, 0x0, 0x0) mq_unlink(&(0x7f0000000100)='eth0\x00') 23:17:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:40 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e0bcfe87b0071") sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0xffffff84}}, &(0x7f0000000180)='GPL\x00'}, 0x48) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000280)=r3, 0x4) sendto$inet(r0, &(0x7f00000009c0)=' ', 0x1, 0x0, 0x0, 0x0) 23:17:40 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) [ 214.423100][T10336] mmap: syz-executor.2 (10336) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. 23:17:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:40 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:40 executing program 4: 23:17:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:40 executing program 4: 23:17:40 executing program 2: 23:17:40 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:40 executing program 4: 23:17:40 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:41 executing program 4: 23:17:41 executing program 2: 23:17:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:41 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:41 executing program 4: 23:17:41 executing program 2: 23:17:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:41 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:41 executing program 2: 23:17:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:42 executing program 4: 23:17:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:42 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:42 executing program 2: 23:17:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:42 executing program 2: 23:17:42 executing program 4: 23:17:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r0}) 23:17:42 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:42 executing program 4: 23:17:42 executing program 2: 23:17:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:43 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r0}) 23:17:43 executing program 4: 23:17:43 executing program 2: 23:17:43 executing program 2: 23:17:43 executing program 4: 23:17:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r0}) 23:17:43 executing program 2: 23:17:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:43 executing program 4: 23:17:43 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:43 executing program 2: 23:17:43 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:43 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:44 executing program 2: 23:17:44 executing program 4: 23:17:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="ca"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000000)=[@textreal={0x8, 0x0}], 0xaaaaafe, 0x0, 0x0, 0xffffffffffffffdd) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(0xffffffffffffffff, 0xc0585605, 0x0) 23:17:44 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:44 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'icmp\x00'}, &(0x7f0000000200)=0x1e) 23:17:44 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semtimedop(0x0, &(0x7f0000000200)=[{}, {}], 0x2, 0x0) 23:17:44 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:44 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f0000000140)={{0x0, 0x0, 0x0, 0x0, 'syz0\x00'}, 0x3, 0x20, 0x2, 0x0, 0x1, 0x0, 'syz0\x00', &(0x7f00000000c0)=['/dev/snd/controlC#\x00'], 0x13}) 23:17:44 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:44 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:44 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:45 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:45 executing program 4: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/fib_trie\x00') preadv(r0, &(0x7f00000017c0), 0x1d0, 0x1f000000) 23:17:45 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:45 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:45 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:45 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:45 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:45 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:45 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:45 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:46 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:46 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:46 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:46 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:46 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:46 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:46 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:46 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:47 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:47 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:47 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:47 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:47 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000100)={0xc02f}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, 0x0, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x8, @empty, 0xfffffffffffffffa}, 0x1c) pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000058, 0x0) accept4$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', r3}) 23:17:47 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r0}) 23:17:47 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:47 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:47 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r0}) 23:17:47 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:48 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:48 executing program 2: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r0}) 23:17:48 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000100)={0xc02f}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, 0x0, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x8, @empty, 0xfffffffffffffffa}, 0x1c) pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000058, 0x0) accept4$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', r3}) 23:17:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:48 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:48 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, 0x0) 23:17:48 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:48 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180), 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:48 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:48 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) [ 223.072996][T10783] cgroup: fork rejected by pids controller in /syz1 23:17:48 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, 0x0) 23:17:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:49 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, 0x0) 23:17:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:49 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:49 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) openat$cuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r1, 0xc0206416, 0x0) connect$inet6(r0, &(0x7f0000000380)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000100)={0xc02f}) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140), 0x0) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x79, 0x0, 0x0) bind$inet6(r0, &(0x7f00000001c0)={0xa, 0x4e21, 0x8, @empty, 0xfffffffffffffffa}, 0x1c) pipe2$9p(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000058, 0x0) accept4$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000180)={'team0\x00', r3}) 23:17:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:49 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311c", 0x8) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:49 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:49 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:49 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:49 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:50 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:50 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52", 0xc) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:50 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x24a01, 0x0) 23:17:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:50 executing program 0 (fault-call:3 fault-nth:0): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:50 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d8", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:50 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:50 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_submit(0x0, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) [ 225.277592][T11107] FAULT_INJECTION: forcing a failure. [ 225.277592][T11107] name failslab, interval 1, probability 0, space 0, times 1 [ 225.330881][T11107] CPU: 0 PID: 11107 Comm: syz-executor.0 Not tainted 5.2.0+ #90 [ 225.338578][T11107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 225.348666][T11107] Call Trace: [ 225.352021][T11107] dump_stack+0x172/0x1f0 [ 225.356392][T11107] should_fail.cold+0xa/0x15 [ 225.360996][T11107] ? fault_create_debugfs_attr+0x180/0x180 [ 225.361034][T11107] ? ___might_sleep+0x163/0x280 [ 225.361062][T11107] __should_failslab+0x121/0x190 [ 225.361081][T11107] should_failslab+0x9/0x14 [ 225.381326][T11107] __kmalloc+0x2e0/0x770 [ 225.385600][T11107] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 225.385623][T11107] ? rcu_read_lock_sched_held+0x110/0x130 [ 225.385637][T11107] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 225.385663][T11107] tomoyo_realpath_from_path+0xcd/0x7b0 [ 225.408368][T11107] ? tomoyo_path_number_perm+0x193/0x520 [ 225.414034][T11107] tomoyo_path_number_perm+0x1dd/0x520 [ 225.419511][T11107] ? tomoyo_path_number_perm+0x193/0x520 [ 225.425165][T11107] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 225.430993][T11107] ? __f_unlock_pos+0x19/0x20 [ 225.431057][T11107] ? __fget+0x384/0x560 [ 225.431079][T11107] ? ksys_dup3+0x3e0/0x3e0 [ 225.431097][T11107] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 225.431112][T11107] ? fput_many+0x12c/0x1a0 [ 225.431132][T11107] tomoyo_file_ioctl+0x23/0x30 [ 225.459754][T11107] security_file_ioctl+0x77/0xc0 [ 225.464716][T11107] ksys_ioctl+0x57/0xd0 [ 225.468882][T11107] __x64_sys_ioctl+0x73/0xb0 [ 225.473508][T11107] do_syscall_64+0xfd/0x6a0 23:17:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d8", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) [ 225.478045][T11107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 225.483956][T11107] RIP: 0033:0x459829 [ 225.483973][T11107] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 225.483981][T11107] RSP: 002b:00007f882b060c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 225.483996][T11107] RAX: ffffffffffffffda RBX: 00007f882b060c90 RCX: 0000000000459829 23:17:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d8", 0xe) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) [ 225.484005][T11107] RDX: 0000000020000180 RSI: 000000004008af10 RDI: 0000000000000003 [ 225.484026][T11107] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 225.484035][T11107] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f882b0616d4 [ 225.484044][T11107] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000005 [ 225.554284][T11107] ERROR: Out of memory at tomoyo_realpath_from_path. 23:17:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:51 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86b", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:51 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:51 executing program 0 (fault-call:3 fault-nth:1): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:51 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:51 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:51 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86b", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) [ 225.953222][T11240] FAULT_INJECTION: forcing a failure. [ 225.953222][T11240] name failslab, interval 1, probability 0, space 0, times 0 [ 226.020989][T11240] CPU: 1 PID: 11240 Comm: syz-executor.0 Not tainted 5.2.0+ #90 [ 226.028743][T11240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.038803][T11240] Call Trace: [ 226.042112][T11240] dump_stack+0x172/0x1f0 [ 226.046478][T11240] should_fail.cold+0xa/0x15 [ 226.051107][T11240] ? fault_create_debugfs_attr+0x180/0x180 [ 226.056925][T11240] ? ___might_sleep+0x163/0x280 [ 226.061792][T11240] __should_failslab+0x121/0x190 [ 226.066755][T11240] should_failslab+0x9/0x14 [ 226.071270][T11240] __kmalloc+0x2e0/0x770 [ 226.075533][T11240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.081782][T11240] ? d_absolute_path+0x11b/0x170 [ 226.086732][T11240] ? __d_path+0x140/0x140 [ 226.091091][T11240] ? tomoyo_encode2.part.0+0xf5/0x400 [ 226.096473][T11240] tomoyo_encode2.part.0+0xf5/0x400 [ 226.101687][T11240] tomoyo_encode+0x2b/0x50 [ 226.106113][T11240] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 226.111758][T11240] tomoyo_path_number_perm+0x1dd/0x520 [ 226.111774][T11240] ? tomoyo_path_number_perm+0x193/0x520 [ 226.111799][T11240] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 226.128729][T11240] ? __f_unlock_pos+0x19/0x20 [ 226.128780][T11240] ? __fget+0x384/0x560 [ 226.128801][T11240] ? ksys_dup3+0x3e0/0x3e0 [ 226.128825][T11240] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 226.148305][T11240] ? fput_many+0x12c/0x1a0 [ 226.152749][T11240] tomoyo_file_ioctl+0x23/0x30 [ 226.157526][T11240] security_file_ioctl+0x77/0xc0 [ 226.162514][T11240] ksys_ioctl+0x57/0xd0 [ 226.166697][T11240] __x64_sys_ioctl+0x73/0xb0 [ 226.171306][T11240] do_syscall_64+0xfd/0x6a0 [ 226.175838][T11240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.181769][T11240] RIP: 0033:0x459829 [ 226.185683][T11240] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.205826][T11240] RSP: 002b:00007f882b060c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 226.214286][T11240] RAX: ffffffffffffffda RBX: 00007f882b060c90 RCX: 0000000000459829 [ 226.222263][T11240] RDX: 0000000020000180 RSI: 000000004008af10 RDI: 0000000000000003 [ 226.230251][T11240] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.238243][T11240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f882b0616d4 [ 226.238258][T11240] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000005 [ 226.262115][T11240] ERROR: Out of memory at tomoyo_realpath_from_path. 23:17:52 executing program 4: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:52 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:52 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86b", 0xf) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:52 executing program 0 (fault-call:3 fault-nth:2): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:52 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) [ 226.662789][T11408] FAULT_INJECTION: forcing a failure. [ 226.662789][T11408] name failslab, interval 1, probability 0, space 0, times 0 [ 226.710813][T11408] CPU: 0 PID: 11408 Comm: syz-executor.0 Not tainted 5.2.0+ #90 [ 226.718517][T11408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 226.728588][T11408] Call Trace: [ 226.731900][T11408] dump_stack+0x172/0x1f0 [ 226.736272][T11408] should_fail.cold+0xa/0x15 [ 226.740875][T11408] ? fault_create_debugfs_attr+0x180/0x180 [ 226.746703][T11408] ? ___might_sleep+0x163/0x280 [ 226.751573][T11408] __should_failslab+0x121/0x190 [ 226.756527][T11408] should_failslab+0x9/0x14 [ 226.761030][T11408] __kmalloc+0x2e0/0x770 [ 226.761064][T11408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 226.761082][T11408] ? d_absolute_path+0x11b/0x170 [ 226.761095][T11408] ? __d_path+0x140/0x140 [ 226.761116][T11408] ? tomoyo_encode2.part.0+0xf5/0x400 [ 226.786234][T11408] tomoyo_encode2.part.0+0xf5/0x400 [ 226.791459][T11408] tomoyo_encode+0x2b/0x50 [ 226.795885][T11408] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 226.801545][T11408] tomoyo_path_number_perm+0x1dd/0x520 [ 226.807011][T11408] ? tomoyo_path_number_perm+0x193/0x520 [ 226.812667][T11408] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 226.818501][T11408] ? __f_unlock_pos+0x19/0x20 [ 226.823242][T11408] ? __fget+0x384/0x560 [ 226.827421][T11408] ? ksys_dup3+0x3e0/0x3e0 [ 226.831856][T11408] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 226.838123][T11408] ? fput_many+0x12c/0x1a0 [ 226.842607][T11408] tomoyo_file_ioctl+0x23/0x30 [ 226.847815][T11408] security_file_ioctl+0x77/0xc0 [ 226.852760][T11408] ksys_ioctl+0x57/0xd0 [ 226.856924][T11408] __x64_sys_ioctl+0x73/0xb0 23:17:52 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) [ 226.861542][T11408] do_syscall_64+0xfd/0x6a0 [ 226.866070][T11408] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 226.872065][T11408] RIP: 0033:0x459829 [ 226.875965][T11408] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 226.895589][T11408] RSP: 002b:00007f882b060c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 226.904014][T11408] RAX: ffffffffffffffda RBX: 00007f882b060c90 RCX: 0000000000459829 [ 226.904024][T11408] RDX: 0000000020000180 RSI: 000000004008af10 RDI: 0000000000000003 [ 226.904032][T11408] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 226.904040][T11408] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f882b0616d4 [ 226.904048][T11408] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000005 [ 226.912361][T11408] ERROR: Out of memory at tomoyo_realpath_from_path. 23:17:52 executing program 4: r0 = socket(0x13, 0x20000000004, 0x9) acct(&(0x7f0000000000)='./file0\x00') ioctl$sock_ifreq(r0, 0x8924, &(0x7f0000000040)={'batadv0\x00\x00\x00\x00\f\x00', @ifru_settings={0x1, 0xea01, @fr_pvc=0x0}}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f00000000c0)={0x0, 0xfb, 0x8b, 0x3, 0x6, "b4a9a2e0e53017a037de03205e0f1b9d", "57a9ae3a3578d0b169731cfc99723c0fd50c192ac306c96860335f325b0c55d7b4cdd7dad6aaf84b7960bc03d5c29e2b8822e618fa1ebe00735dd4108c9a8cd7a95c1a21b9d9321c6d1df30738d633784ce63a25b8c936b0ec9af63448019774ea44dc938f0ab671a05d78333e09e57ecd70ea34fad8"}, 0x8b, 0x1) 23:17:52 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:52 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:52 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:53 executing program 0 (fault-call:3 fault-nth:3): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x80284504, &(0x7f0000000200)=""/232) 23:17:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:53 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, 0x0) 23:17:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x80284504, &(0x7f0000000200)=""/232) 23:17:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x2, &(0x7f0000000180)={0x0, r1}) 23:17:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:53 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) 23:17:53 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, 0x0) 23:17:53 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaea2) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 23:17:53 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:53 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8, &(0x7f0000000180)={0x0, r1}) 23:17:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) 23:17:54 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, 0x0) 23:17:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, 0x0, 0x0) 23:17:54 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) r2 = dup2(r1, r1) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r2, 0xc0045540, &(0x7f00000001c0)=0x100) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x01\x00', 0x6}) ioctl$TUNSETLINK(r1, 0x400454cd, 0x8013) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x400, 0x0) r4 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x0, 0x2) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000200), 0x4) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x82, 0x10000) renameat(r3, &(0x7f00000000c0)='./file0\x00', r4, &(0x7f0000000140)='./file0\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8914, &(0x7f0000000c40)='/dev/net/tun\x00') 23:17:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x10, &(0x7f0000000180)={0x0, r1}) 23:17:54 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:54 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540), 0x0) 23:17:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4c01, &(0x7f0000000180)={0x0, r1}) 23:17:54 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:54 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) syz_open_dev$swradio(&(0x7f0000000200)='/dev/swradio#\x00', 0x0, 0x2) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vcs\x00', 0x200040, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x2) r1 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7, 0x200000) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vsock\x00', 0x100, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f00000000c0)={0xfee0, 0x2, 0x0, {0x5, 0x401, 0x9}}, 0x28) clone(0x3fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000340)=0xffffffffffffffff, 0x4) r3 = add_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080)="34c21f2fa3a5911a30715826b2945190b74f0579a6a44a0d3a78e186968437c6", 0x20, 0xfffffffffffffffe) fstat(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000300)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f00000003c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000280), 0x3, r5, 0x30, 0x1, @ib={0x1b, 0x100, 0x5, {"404a7af1068ed64abe6e42e863cc3e80"}, 0x4, 0x7, 0xfff}}}, 0xa0) keyctl$get_persistent(0x16, r4, r3) 23:17:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:54 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540), 0x0) 23:17:54 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4c08, &(0x7f0000000180)={0x0, r1}) [ 229.115786][T12088] encrypted_key: insufficient parameters specified 23:17:54 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)) 23:17:55 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000080)=0x5, 0xfffffffffffffecd) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x70}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x2, {0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4001, 0x0, @local, @dev={0xac, 0x14, 0x14, 0x2}}}}}}}, 0x0) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000280)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmsg$sock(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000840)=[{&(0x7f00000005c0)="ee", 0x1}], 0x1}, 0x4000000) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") close(r0) [ 229.218549][T12133] encrypted_key: insufficient parameters specified 23:17:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540), 0x0) 23:17:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5421, &(0x7f0000000180)={0x0, r1}) 23:17:55 executing program 2 (fault-call:3 fault-nth:0): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{0x0}], 0x1) 23:17:55 executing program 4: r0 = io_uring_setup(0xa4, &(0x7f0000000080)) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000280), 0x4000000000000102) syncfs(r0) 23:17:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{0x0}], 0x1) [ 229.635319][T12206] FAULT_INJECTION: forcing a failure. [ 229.635319][T12206] name failslab, interval 1, probability 0, space 0, times 0 [ 229.670511][T12206] CPU: 0 PID: 12206 Comm: syz-executor.2 Not tainted 5.2.0+ #90 [ 229.678189][T12206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 229.688253][T12206] Call Trace: [ 229.691559][T12206] dump_stack+0x172/0x1f0 [ 229.695924][T12206] should_fail.cold+0xa/0x15 [ 229.700534][T12206] ? fault_create_debugfs_attr+0x180/0x180 [ 229.706360][T12206] ? ___might_sleep+0x163/0x280 [ 229.711229][T12206] __should_failslab+0x121/0x190 [ 229.716197][T12206] should_failslab+0x9/0x14 [ 229.720736][T12206] __kmalloc+0x2e0/0x770 [ 229.724994][T12206] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 229.730726][T12206] ? rcu_read_lock_sched_held+0x110/0x130 [ 229.736457][T12206] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 229.742189][T12206] tomoyo_realpath_from_path+0xcd/0x7b0 [ 229.742209][T12206] ? tomoyo_path_number_perm+0x193/0x520 [ 229.742233][T12206] tomoyo_path_number_perm+0x1dd/0x520 [ 229.742249][T12206] ? tomoyo_path_number_perm+0x193/0x520 [ 229.742270][T12206] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 229.742285][T12206] ? __f_unlock_pos+0x19/0x20 [ 229.742328][T12206] ? __fget+0x384/0x560 [ 229.753484][T12206] ? ksys_dup3+0x3e0/0x3e0 [ 229.753503][T12206] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 229.753520][T12206] ? fput_many+0x12c/0x1a0 [ 229.753540][T12206] tomoyo_file_ioctl+0x23/0x30 [ 229.753572][T12206] security_file_ioctl+0x77/0xc0 [ 229.753591][T12206] ksys_ioctl+0x57/0xd0 [ 229.753609][T12206] __x64_sys_ioctl+0x73/0xb0 [ 229.753629][T12206] do_syscall_64+0xfd/0x6a0 [ 229.753648][T12206] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 229.753660][T12206] RIP: 0033:0x459829 [ 229.753681][T12206] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 229.775231][T12206] RSP: 002b:00007f063e387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 229.775247][T12206] RAX: ffffffffffffffda RBX: 00007f063e387c90 RCX: 0000000000459829 [ 229.775257][T12206] RDX: 0000000020000180 RSI: 000000004008af10 RDI: 0000000000000003 [ 229.775266][T12206] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 229.775275][T12206] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f063e3886d4 [ 229.775284][T12206] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000005 [ 229.830602][T12206] ERROR: Out of memory at tomoyo_realpath_from_path. 23:17:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:55 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5450, &(0x7f0000000180)={0x0, r1}) 23:17:55 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:55 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000080)={0x3}) lsetxattr$trusted_overlay_upper(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000180)='trusted.overlay.upper\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xe9, 0x1) 23:17:55 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{0x0}], 0x1) 23:17:55 executing program 2 (fault-call:3 fault-nth:1): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:55 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) [ 230.275994][T12342] FAULT_INJECTION: forcing a failure. [ 230.275994][T12342] name failslab, interval 1, probability 0, space 0, times 0 [ 230.310828][T12342] CPU: 1 PID: 12342 Comm: syz-executor.2 Not tainted 5.2.0+ #90 [ 230.318536][T12342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.323791][T12367] FAULT_INJECTION: forcing a failure. [ 230.323791][T12367] name failslab, interval 1, probability 0, space 0, times 0 [ 230.328618][T12342] Call Trace: [ 230.328666][T12342] dump_stack+0x172/0x1f0 [ 230.328694][T12342] should_fail.cold+0xa/0x15 [ 230.353699][T12342] ? fault_create_debugfs_attr+0x180/0x180 [ 230.359524][T12342] ? ___might_sleep+0x163/0x280 [ 230.364394][T12342] __should_failslab+0x121/0x190 [ 230.369345][T12342] should_failslab+0x9/0x14 [ 230.373853][T12342] __kmalloc+0x2e0/0x770 [ 230.378109][T12342] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.384357][T12342] ? d_absolute_path+0x11b/0x170 [ 230.389304][T12342] ? __d_path+0x140/0x140 [ 230.393641][T12342] ? tomoyo_encode2.part.0+0xf5/0x400 [ 230.399044][T12342] tomoyo_encode2.part.0+0xf5/0x400 [ 230.404252][T12342] tomoyo_encode+0x2b/0x50 [ 230.408691][T12342] tomoyo_realpath_from_path+0x1d3/0x7b0 [ 230.414344][T12342] tomoyo_path_number_perm+0x1dd/0x520 [ 230.414360][T12342] ? tomoyo_path_number_perm+0x193/0x520 [ 230.414381][T12342] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 230.431277][T12342] ? __f_unlock_pos+0x19/0x20 [ 230.431331][T12342] ? __fget+0x384/0x560 [ 230.431353][T12342] ? ksys_dup3+0x3e0/0x3e0 [ 230.431373][T12342] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 230.431394][T12342] ? fput_many+0x12c/0x1a0 [ 230.455255][T12342] tomoyo_file_ioctl+0x23/0x30 [ 230.460041][T12342] security_file_ioctl+0x77/0xc0 [ 230.464997][T12342] ksys_ioctl+0x57/0xd0 [ 230.469170][T12342] __x64_sys_ioctl+0x73/0xb0 [ 230.473777][T12342] do_syscall_64+0xfd/0x6a0 [ 230.478293][T12342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.484192][T12342] RIP: 0033:0x459829 [ 230.488101][T12342] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.507725][T12342] RSP: 002b:00007f063e387c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 230.516144][T12342] RAX: ffffffffffffffda RBX: 00007f063e387c90 RCX: 0000000000459829 23:17:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5451, &(0x7f0000000180)={0x0, r1}) [ 230.524129][T12342] RDX: 0000000020000180 RSI: 000000004008af10 RDI: 0000000000000003 [ 230.532111][T12342] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.540100][T12342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f063e3886d4 [ 230.548087][T12342] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000005 [ 230.556081][T12367] CPU: 0 PID: 12367 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 230.563751][T12367] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 230.573832][T12367] Call Trace: 23:17:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) [ 230.573862][T12367] dump_stack+0x172/0x1f0 [ 230.573886][T12367] should_fail.cold+0xa/0x15 [ 230.573905][T12367] ? fault_create_debugfs_attr+0x180/0x180 [ 230.573927][T12367] ? ___might_sleep+0x163/0x280 [ 230.573949][T12367] __should_failslab+0x121/0x190 [ 230.573967][T12367] should_failslab+0x9/0x14 [ 230.573987][T12367] __kmalloc+0x2e0/0x770 [ 230.610453][T12367] ? af_alg_wait_for_wmem+0x520/0x520 [ 230.615843][T12367] ? lock_sock_nested+0x9a/0x120 [ 230.620786][T12367] ? sock_kmalloc+0xc6/0x120 [ 230.625396][T12367] sock_kmalloc+0xc6/0x120 [ 230.629825][T12367] af_alg_alloc_areq+0x24/0x1e0 [ 230.629845][T12367] skcipher_recvmsg+0x7f8/0xdb0 [ 230.629876][T12367] ? skcipher_bind+0x30/0x30 [ 230.644142][T12367] ? apparmor_socket_recvmsg+0x2a/0x30 [ 230.649618][T12367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.655866][T12367] ? security_socket_recvmsg+0x95/0xc0 [ 230.661331][T12367] ? skcipher_bind+0x30/0x30 [ 230.665931][T12367] sock_recvmsg+0xce/0x110 [ 230.670356][T12367] sock_read_iter+0x299/0x3b0 [ 230.675038][T12367] ? sock_recvmsg+0x110/0x110 [ 230.679739][T12367] ? fsnotify+0xbc0/0xbc0 [ 230.684085][T12367] do_iter_readv_writev+0x711/0x8f0 [ 230.689304][T12367] ? no_seek_end_llseek_size+0x70/0x70 [ 230.689330][T12367] ? rw_verify_area+0x126/0x360 [ 230.689349][T12367] do_iter_read+0x27c/0x660 [ 230.704157][T12367] ? dup_iter+0x250/0x250 [ 230.708506][T12367] vfs_readv+0xf0/0x160 [ 230.712718][T12367] ? compat_rw_copy_check_uvector+0x4c0/0x4c0 [ 230.718790][T12367] ? __kasan_check_read+0x11/0x20 [ 230.723833][T12367] ? ksys_dup3+0x3e0/0x3e0 [ 230.728265][T12367] ? wait_for_completion+0x440/0x440 [ 230.733553][T12367] ? __fget_light+0x1a9/0x230 [ 230.733588][T12367] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 230.733606][T12367] do_readv+0x15b/0x330 [ 230.733637][T12367] ? vfs_readv+0x160/0x160 [ 230.733658][T12367] ? do_syscall_64+0x26/0x6a0 [ 230.733674][T12367] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.733688][T12367] ? do_syscall_64+0x26/0x6a0 [ 230.733708][T12367] __x64_sys_readv+0x75/0xb0 [ 230.733725][T12367] do_syscall_64+0xfd/0x6a0 [ 230.733751][T12367] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 230.757876][T12367] RIP: 0033:0x459829 [ 230.757895][T12367] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 230.757904][T12367] RSP: 002b:00007f02f7baac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 230.757920][T12367] RAX: ffffffffffffffda RBX: 00007f02f7baac90 RCX: 0000000000459829 [ 230.757929][T12367] RDX: 0000000000000001 RSI: 0000000020001540 RDI: 0000000000000004 [ 230.757944][T12367] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 230.807232][T12367] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02f7bab6d4 [ 230.807241][T12367] R13: 00000000004c69e4 R14: 00000000004dbc50 R15: 0000000000000005 23:17:56 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5452, &(0x7f0000000180)={0x0, r1}) [ 230.931066][T12342] ERROR: Out of memory at tomoyo_realpath_from_path. 23:17:56 executing program 2 (fault-call:3 fault-nth:2): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:17:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:56 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:56 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000008000)="4c0000001200ff09fffefd9567a283b724a600800000000000000068354046002c00120034c41180b598bc593ab6821148a730de33a49868c62b2ca63d89613b6aabf35d4c1cbc882b079881", 0x4c}], 0x1}, 0x0) r1 = socket(0x2000000000000010, 0x80002, 0x80000000000006) sendmmsg$alg(r1, &(0x7f0000000140), 0x492492492492506, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e22, @loopback}}}, &(0x7f0000000000)=0x84) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={r2, 0x200}, &(0x7f00000000c0)=0x8) 23:17:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5460, &(0x7f0000000180)={0x0, r1}) 23:17:57 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) [ 231.283673][T12556] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. [ 231.383543][T12588] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.4'. 23:17:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5603, &(0x7f0000000180)={0x0, r1}) 23:17:57 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:57 executing program 4: socketpair(0x202000000008, 0x1, 0x6, &(0x7f0000000040)) 23:17:57 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") add_key(&(0x7f0000000100)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f00000001c0)="0cdb23c385bc64dbbea4c9d2eb1d167ecebb026ac7da5372c7edf1d839ba2107794275a5610b69ebd222d01e22ceaf680eaa1dd44d5921c0f2d95f14bca14db80cb768876e9d2d9f39fe6342614bf01dda89a849c1a1a09e6642cf973fedf398cff3c86debb3cf3249fe8356c64f2273b208338865560c04ffa021f987bf916611ec976d1e98d6403972bcb314abcfa54163a001adf7f88e40c09f629a0375a3d4b622d5c6bb4198d5d42e2896accd09", 0xb0, 0xffffffffffffffff) r1 = dup(r0) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) 23:17:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x20000533}], 0x1) 23:17:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x6364, &(0x7f0000000180)={0x0, r1}) [ 231.797457][T12756] encrypted_key: master key parameter '' is invalid [ 231.854197][T12796] encrypted_key: master key parameter '' is invalid 23:17:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:57 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x7ffff000}], 0x1) 23:17:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x890c, &(0x7f0000000180)={0x0, r1}) 23:17:57 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x2, &(0x7f0000000180)={0x0, r1}) 23:17:57 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000040)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000000)=0x2, r1, 0x0, 0x1, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r1}}, 0x10) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x10000, 0x0) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000380)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@initdev}}, &(0x7f0000000480)=0xe8) sendmsg$FOU_CMD_GET(r2, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000c0}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x64, r3, 0x320, 0x70bd2c, 0x25dfdbff, {}, [@FOU_ATTR_LOCAL_V6={0x14, 0x7, @remote}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0xef}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x25}}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @remote}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e24}]}, 0x64}, 0x1, 0x0, 0x0, 0x20008040}, 0x4004) r5 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0x5, 0x200) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r5, 0x4018620d, &(0x7f00000001c0)={0x73622a85, 0xa, 0x2}) write$RDMA_USER_CM_CMD_BIND(r0, &(0x7f0000000200)={0x14, 0x88, 0xfa00, {r1, 0x1c, 0x0, @ib={0x1b, 0x5, 0xf1b, {"847aeaee9888950c9ccd8d060b0911e4"}, 0x2, 0x1, 0x100}}}, 0x90) 23:17:57 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0xffffffffffffffff}], 0x1) 23:17:57 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'syz_tun\x00', 0x0}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000200)=0x0) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x401, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r0, &(0x7f00000001c0)={r4, r0, 0x2}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@ipv6_newaddr={0x34, 0x14, 0x101, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r1}, [@IFA_FLAGS={0x8, 0x8, 0x190}, @IFA_LOCAL={0x14, 0x2, @local}]}, 0x34}}, 0x0) 23:17:57 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:57 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8912, &(0x7f0000000180)={0x0, r1}) 23:17:58 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8, &(0x7f0000000180)={0x0, r1}) 23:17:58 executing program 4: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) bind$rds(r0, &(0x7f0000000280)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e23, 0x1000, @dev={0xfe, 0x80, [], 0xe}, 0xc6}}, [0x9, 0x100000001, 0x8, 0x0, 0x6, 0x1, 0xb2, 0x85, 0xfff, 0xd92, 0xff, 0x625, 0xffff000, 0x7106, 0x3f]}, &(0x7f0000000000)=0x100) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000180)={r1, @in={{0x2, 0x4e21, @empty}}}, &(0x7f0000000240)=0x84) seccomp(0xffffffffffffffff, 0x1, &(0x7f0000000040)) 23:17:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8933, &(0x7f0000000180)={0x0, r1}) 23:17:58 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x2) 23:17:58 executing program 4: r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x18100, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @remote, @multicast1}, &(0x7f0000000180)=0xc) r3 = geteuid() setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@empty, @in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x28}}, 0x4e23, 0x0, 0x4e24, 0x0, 0xa, 0xa0, 0xa0, 0x87, r2, r3}, {0x4, 0x7, 0x3, 0x2, 0xffff, 0x5, 0xff, 0x80000000}, {0x3, 0x5984, 0xfffffffffffffe00, 0xffffffff}, 0x9, 0x6e6bbd, 0x1, 0x1, 0x2}, {{@in6=@ipv4={[], [], @multicast2}, 0x4d2, 0x58addc82e05ad55e}, 0xa, @in6=@local, 0x3504, 0x6, 0x1, 0x4, 0x5, 0xfffffffffffeffff, 0x3f}}, 0xe8) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000000)=0x114) r4 = socket$tipc(0x1e, 0x7, 0x0) accept4$tipc(r4, &(0x7f0000000040)=@id, &(0x7f00000000c0)=0x10, 0x80800) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x1) 23:17:58 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x10, &(0x7f0000000180)={0x0, r1}) 23:17:58 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x8) 23:17:58 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x3, 0xc040) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f00000004c0)={0x1000000e, 0xfffbffffffffffff, 0x1}) 23:17:58 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4c01, &(0x7f0000000180)={0x0, r1}) 23:17:58 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x894b, &(0x7f0000000180)={0x0, r1}) 23:17:58 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000000000), 0x0) 23:17:59 executing program 4: r0 = syz_open_dev$usbmon(&(0x7f0000000400)='/dev/usbmon#\x00', 0x200, 0x10080) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000680)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000640)={&(0x7f00000004c0)={0x154, r1, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x38, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8b5d}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1f}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_MEDIA={0x40, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1c986}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_MEDIA={0x7c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffff000}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}]}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x48dae56b}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdc45}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa6ec}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}]}, 0x154}, 0x1, 0x0, 0x0, 0x20000000}, 0x80) r2 = socket(0x10, 0x2, 0x0) write(r2, &(0x7f0000000000)="1c0000001a009b8a0500"/28, 0x1c) recvmmsg(r2, &(0x7f0000003480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 23:17:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x3) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:17:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:17:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8955, &(0x7f0000000180)={0x0, r1}) 23:17:59 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x541e, &(0x7f0000000180)={0x0, r1}) 23:17:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:17:59 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x4, 0x80000) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000040)) 23:17:59 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfe47bf070") getpgrp(0xffffffffffffffff) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0xc) tgkill(r1, 0x0, 0x0) 23:17:59 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5421, &(0x7f0000000180)={0x0, r1}) 23:17:59 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x89e1, &(0x7f0000000180)={0x0, r1}) 23:17:59 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:00 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000000)={0x18, 0x0, {0x5, @link_local, 'bridge0\x00'}}, 0x1e) ioctl$PPPIOCGMRU(r0, 0x4008b100, &(0x7f0000000040)) ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000080)) 23:18:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x80800) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5450, &(0x7f0000000180)={0x0, r1}) 23:18:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 23:18:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae01, &(0x7f0000000180)={0x0, r1}) 23:18:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x8800) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x2) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYPTR64=&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR64, @ANYRESOCT=r0, @ANYRES32, @ANYRES16=r1, @ANYRESOCT=r2, @ANYRES16=r1, @ANYRESHEX=0x0]]], 0x1}}, 0x4) 23:18:00 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vcs\x00', 0x8080, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x6) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x21, 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000540)={0x7, 0x0, 0x7, 0x3, 0x8, [{0x7, 0x80000001, 0x1, 0x0, 0x0, 0x1}, {0x4, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x8}, {0x10001, 0xa3, 0x200, 0x0, 0x0, 0x8}, {0x0, 0x6, 0x8, 0x0, 0x0, 0xd}, {0xe2b, 0x9, 0x10001, 0x0, 0x0, 0x104}, {0xa5, 0xe7, 0x8, 0x0, 0x0, 0x80}, {0x4, 0x8000000000000000, 0x5, 0x0, 0x0, 0x3080}, {0x8, 0x12c7, 0x3f, 0x0, 0x0, 0x2}]}) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x100, 0x0) ioctl$DRM_IOCTL_GET_UNIQUE(r4, 0xc0106401, &(0x7f0000000140)={0xff, &(0x7f00000002c0)=""/255}) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x80}, 0x28, 0x2) 23:18:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5451, &(0x7f0000000180)={0x0, r1}) 23:18:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], 0x0, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:00 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="71e67a15cdf0311cfcf33a52a7c86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x280400) geteuid() dup3(r1, r0, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000140)={0x6, 0x0, [{0xc0000019, 0x4, 0x2, 0xbe3, 0x9, 0x20, 0x2e5}, {0x80000008, 0xf9, 0x6, 0x80, 0x7f, 0x7, 0x81}, {0x8000000f, 0x6ae9, 0x0, 0x2, 0x0, 0xfffffffffffffff8, 0x2}, {0xc0000001, 0x1, 0x2, 0x1b, 0xfffffffffffffc00, 0x7, 0x4}, {0xc0000001, 0x3ee3, 0x2, 0x1ff, 0x3, 0x2, 0x4000000000000}, {0xb, 0x4, 0x6, 0xffffffffffffb7ee, 0x0, 0x5, 0x7fffffff}]}) 23:18:00 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5452, &(0x7f0000000180)={0x0, r1}) 23:18:00 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae41, &(0x7f0000000180)={0x0, r1}) 23:18:00 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], 0x0, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_pts(r0, 0x280400) geteuid() dup3(r1, r0, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000140)={0x6, 0x0, [{0xc0000019, 0x4, 0x2, 0xbe3, 0x9, 0x20, 0x2e5}, {0x80000008, 0xf9, 0x6, 0x80, 0x7f, 0x7, 0x81}, {0x8000000f, 0x6ae9, 0x0, 0x2, 0x0, 0xfffffffffffffff8, 0x2}, {0xc0000001, 0x1, 0x2, 0x1b, 0xfffffffffffffc00, 0x7, 0x4}, {0xc0000001, 0x3ee3, 0x2, 0x1ff, 0x3, 0x2, 0x4000000000000}, {0xb, 0x4, 0x6, 0xffffffffffffb7ee, 0x0, 0x5, 0x7fffffff}]}) 23:18:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 23:18:01 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5460, &(0x7f0000000180)={0x0, r1}) 23:18:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x200, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000040), 0x4) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae60, &(0x7f0000000180)={0x0, r1}) 23:18:01 executing program 4: r0 = socket(0x1, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8990, &(0x7f0000000040)={'bond0\x00\x00\x00\x00\x06\x00\x00\x01\x00', @ifru_settings={0x0, 0x0, @fr_pvc=0x0}}) fcntl$getown(r0, 0x9) socket$bt_bnep(0x1f, 0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000007a80)={'bridge_slave_1\x00', 0x0}) sendmsg$can_bcm(r0, &(0x7f0000007bc0)={&(0x7f0000007ac0)={0x1d, r1}, 0x10, &(0x7f0000007b80)={&(0x7f0000007b00)={0x6, 0x10, 0x5, {}, {0x77359400}, {0x0, 0x8, 0x1, 0x7}, 0x1, @can={{0x1, 0x1, 0x1}, 0x8, 0x1, 0x0, 0x0, "060b5b228c721652"}}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x20040084) sendmmsg(r0, &(0x7f00000078c0)=[{{0x0, 0x0, &(0x7f0000002280)=[{&(0x7f0000000080)="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", 0x1000}, {&(0x7f0000001080)="d549c0fc5b18c151fb609ea1e2eae55727b936415063d04b351f021f22b3b18c2fd314670b31dca2032ca3f252bfdd0167bd1c512049a1117763ed8ef1f780adceba9d443de1b4c0d94145f930bd621660dbfcd4b95c6959fef0c3f5de638bb525161e2a943128436f1d87621b9a7a24796086ee2499e66903fafb1684268d7282cf4e07ca24509483fbef950588fa6d0d47a048dbddac578249894b0fe6b7d14c50db614075923cbf7b8ad524326c3988d83e900cacb2cb26146f809b1c8cfa1cbfc8caaf7a4395b8d52785b0dad27fb5dd0715b97c02651ff080c65ba3ddadbbf7d6be7164d5847572e2090aaaac5b574ed76d2e2a0753753c233db01198cf90ccc831b3e1a1b2df2cbc0c96df93948da023f3abf6fc0fb3a6ccb7dc686385c3a0e11c2fcc52ccc392ed29e0091181527cd44a9a14d3b441de86a44ce6d34816ab3b7993d38585af16f6c3ec832dff719fb9722e4072ec338216799e054ad6474011ba00ea371e86867a6e1b92f360c176003d28f938461b4e89948368df027a397004e11d3c79ffad35727c2ae481fada964a0a63b3a1b17ee5cd34b4c19d8879f9ff464b1c1664db24088e343f39babc662da9702ae6d97b2221e0049751abb682dce583be82acb641218244c5eaa8fb51e06130ad5cfdf5a7e8040b4663e9b20aefce776b2764d688dc74f7742acdb6082b20a360e909d183ff7ac774050e7ed636520c7e10a3bf3982a4306a32ac028d6512d5cc928df263511d59d284245ba457d63d145b8e4258db3aa3d3fd0090d8fe27acd7d383c5f8539b6ebdf828367639a5fae1a1dbb11fb0fbdb8b0a54f4a2547e22f5679d0dd91e0ecb8b0349329c148bf0926d4cd224f864835d72907d81621ed0366c3d88a69d22cd1e2334d5dd0b6f059b3c72be40dc54606a46c0978b904d832eb4ddec3b2769fcd7b33c981fd42cbe248ce3f678158a97cb2178844db25cb0a41b0627d1036c19e9654fd9e7fa5fd2b49a0461dd3dbc5a2911b132a4a675ccedc27da7ccc6480fb748b9f6031c04b1c43158ed8aad70fe7854ab89fbe5cd7bceee71ed2297c32bc9c07ba81849a0b2e01f6494a7a732e600fcde4d0fe3e304d8a4251240d49e312b87f174cd3cdf566b8567b578142cefd888622c705dd4d9a3334b0e08b47f17518ef5d74e4a63fd304c4565ce02fe48ca154600a4a463ac4d57defeeecfc294aa1bd71c2555361fd4d59359196ffda25f19a46c26470b87ff461419890061c7082012719ab12e719cf9ff2bb186a7334e70a00820782042b9dd1af9628cc228a880f1fb111e63d308decad3b028aa97fc4953f50a4d149eab570ffa6f161ad56d12618a3f4e9d93ce2ba18196ec95607aabdc50160ff39818cfe88df660a69b5da44a223786c4b246ec70b31a48f02c90b12250410d7fb75375b03dbabf61329c01cda4894130e99132c995f6b0cc0364847de1d6c2bacb99ba9a86b687acc938acb36029f566a287845a6734c219641bd38242542e6c8db2697b0e9d7c1f7253c23a6c1c3ed43f00070ad3eb7dacf3411e45fe026feec3e63a1ec96549ca724dd8941d37f6b1e1bdf117178193002cc6571e6481372b03b262c8f7ab36c9d026847448c4fd8520e28e886cf5c3a434c509b1eb70c15d054420bff77e4df5652c77a71741c67302e3958e3aaa5e674d33fc7594508f41593ba6eba3f1bef3369a457cef0a963ea60cf82933f3d49a7847fe90e3ec5d1ed3000bb3481fb8bab484ae80ba5b85158fd48a8e28694ac110e21d3bd5b2850af36623d9acda8445c8dfcc4942246dcca444376b285245572d5414851b57e5f2d504985a9a9863cab669b45d64dc36946e659d1b77c472e2d6dbe9de58079fc15465042c272d7cd1d0acd5ca855f59e031be0a5606bc0e7b98c7ff4b3551e9baa32d71f42c6baea975b4bdc75d47a321cfe34acfc670972fcb6f2c25a3001bfb8986e20457ec20c42bb3b8cceba0618d96881917400bd726a15889b1e4a598d628532d9c912174daf5c2bae1ff36d3be8d528a858efa7c95bf7a73784cbca572c159c2947d0a6cf312690a199ae987af162ecf000513ef61534f3fb2a237161d3dec2011b334549ba2985a6f2a941acebbcdff3665cfc6ec082525b6a0327cc7cf6cef83f1b52c736a91d3194cf4155812d130f689d4851b411232c2548f380c77fb5331db3f6d1bc53fb69ec569f478c000a61af1872ec3456145047374d0ceac3d4e2b11d86a0e3f7a250c16decb510740d5b8466f1ea96282cf250c92df1034a66e4711c61d41179995a3d47782d34cd6f707eadd37b10ef9319f9e1f016eba897ed1864e1d616877228d4f9867bd830ee14938190685e0ff36fb201a0def40ff0428b5bc2b4a7a6392f5cd237ad8d6305d01880ece681c1407b8e46f2497a4c87053ebd7c5efe3980e90b0426d8730b270da16100a98ba69876f9bd2158a6178f6c6ab3cdcbf88d8c387769fbd36ffcb748d0777d98860ac4946e0ebf12013db8cf7b5b2c42b1880cd3cf866a57eab64fb2a2e4f1c7aa667066869db366f93b9bcd4e848c8bbb6878e22cceacedf196f258724afd9e562c3cf998b2388c879ccb4ef39a941e248f3e1ff60f98960a337cc76955c9a7bf05db5fbbe9be8beb72a198192cbb4e6892ecb11497a5e83556b12979a571d4a952b1fb0fab96958d8e431919f4da8ed1ac257957bd4b470d458a4f696f930f33c51567a94ee59bc22873a0877b5ebd732b5cabb5a7afa3ead4a560ae4c437c31179afc847b7dd1d0648248a6c36b7431cdadb65008790f37aef9837c48307905e0fbeb191cb3ef70e13b7c7c637d4364c72367310fd60ab127a9036d182627e181189a82d0e75e68a2d6806ae7b51ce4a1b8e497cb4aa7f739d611af2324784a68cf819f89ed966d76df978349a432fe3b180a151f08a4c9d63b9c2e7d7a91b0af539315ae3080bcb3981d9bc784b7c7dbd33f92ea6f14496790319be00964a076daa8231dcc158cc93bbbd2bc1cf040cc47602f0d4f3fb90e821a25617e7f6f8bbf120a18286d67fa99deed60772e28a4bcae41aef322a597fff2219ce11ed4e60c7ca094ca361ae2283b6ce0107706e625d6c59603f60fcf8408177955f4d5902dbd64e3a8a2fe51b9267d002054f5ca61d8340ca8a2af4fd4f0f67a3e8c53d4e79798402f64b7df8c11e85e1e46f07809c0d49f988c105ef5defe1cdbcb435826d568d1deca0aa16a345f3fccddce2ab0657cca7e64c16e82ef0147ce46ee252d472b8a14b4f47e3f04df2b7222a1cb41da85b66260a19484710883f33fd996b201b73667aebc4942965fec39731f3ce7db0d0171a08d740c688509500ab29c70313e51fc605202270b8cb822caecad4a9a3e8d75b6dbdc7bde90d483b766b132cdfdd264387b54cbc09eb1ed39d7d87debe0b6f619f45a430c19eb0ecd5a559e55507a2b8acf60d6e39cc5bb059e0305f28c493ac46987a991812697cf8cd245e1c07421ff78b167ad24c2c7ce87b25142550adbde09af7b22cbeee4c9a7a7c57183daa22630e258fee5d0f91038894e3f54e3972cba421ee5717b6d521c15dfb31fca3b6ab4940f7d4a5cca4ef6a003ec7d1875c99eb0121870a2bc0df5691734e0eaac5ec943a729a27ccc00148beb7d4f94995c63fdf1bb5d0f947803adb66af74995d341dd00f0e475c767f6fcfde3019d4128d6655cbfbe86142af427d77aabe46fda4353f467504a2634bc6b71080c78f9f39a2823d63eb1306d23bc3eea241c23e32dbb73ff28350771f27ecb47ed06872e1eb6e0fa4e19439dd93b7b838a1137b2dd9c67dec3ae92c6a92d85313fcf9e74e25f9262c3962a5b8c78ab2910586eb79da5437c5dae26d89bc44264ef0fb3eafdfadb9d0ea342275a46d45b6a7d7833d8937e5893331d0d7e64561720770d47be20e47a8bd6efce0634f5fed41f19a21ee27d7bd581f2744841fca55923c04b2a489c16f6a0419fdf145d68c025bb641b57d68f2890f7a1d867315b41899d4b9eae34ad93e0f92fe4fc2383cd7f09512bf00fea097b4694e01d7e8b0a8fd5a62237ac0f1dc0311ac02dd266b4e0574bda4099bbff8b53e245a49d44351a593138c642f5bf2e810469d9a29c92212dfe71d93cf2f1a0d3e2387586c490867cc577a23c7c832b64e118a480827e54b54377614d30d6878c62dac1067894fbb1b526da04fce823b94563296ec3833c2fe077096b2f2ae6611708d702d9b6860f3a941973e450d1658d99de92404753483f3fc9cb6a4eebdd1a0fc822b50250977c8e1b9f9843920067630cc9b6915bf1cca89504713046dc8dc10c3782481ee38339b8740ea27d517f469e23bd297b1338fc91e5b0e9be6ed9522056a2739bf3c513868aa27e0d6aaf599dd8b525e3afde3df79d2a7e8cf131b9333b886754abb3934ae5815576cd62aacfd09e5535fa8a3a21a4f65bd80f37bac41a5f7f3aa9f60bec591a5ebb89494b5ce97e3ee1792274efefe5628b3e95905546f2313b7d91ec739489f29618e78feed07e1e3659be9288a320e24a836bde0697821fbf7d9ba8c4210bb6eaa2709ab23bb26cf4d5f5191b4155370e6865b0d4316b3c8d2fca189aef99d05b5384c347b136f5da792ce60818ac295853580c55167f46de7166e610b419739289b6557b4bbcc64a137508f5fa6336d668b984f84e09762fc0d42c3b07d8176a9268f67c3547daa6c681287d34c1bcc955fd4398f302ccdd561133d82ef4642be5c910268bb12ffbdfcc5891ef1de59b1ad913afa4f92c332b6dff127228f16e5af766bf321fa770f6ba9610c6bb1357eb15a4977529b2157114d2c6489b96ad77ee4c083cda753a9eb54dd27b81ab565d61a07ca82af7dc2d07c0b98d83d66bab2391c3d914613a8ca981fc5d9df5492b08f50e79eb0de3ec8bf64e87b0e123654399b07d4c62770b47dc428010871acce815280670ccc6360ecb5c110083c802d24f5370c39c6a8b91a3458de13ab44d9bfa4a1c51bd62afe0df12749bc79e397c0c8ce794c40c11f8c833519a90fff564776bf3d0b8880f3a5f0de2d286e02bcbd2f3bbc135a61047ed876a22be7871ab300945ebddd9d16a9aac5185a31256efcbe5d94a66151c85db0f327dd04145e58142eb9e11c7686de7f82a22afe5f28de5dd6636552e0fc3f30393b26fddfc2c03ae317a2e8af420730a2f693864d731a3c8549e94d55e7db6c887225a0576da0ea2baa07678ffb23bc884f99f15f5b6ff8921de0ea7aa5aff6de40c00d79d5466cd4c40691cee2ff4677db304c2abc5d8c59cdf10f87e26bd9b44e398f05b1007b40fec770c6d0724355cdecc10641844fea6355245e8aaeebb41838bc25da3279655a20f09fc680537df8077539bcd7adab82a8817214269823366e64b0a1772a41ef7544197cacce93f188543708016b31e50d58e8d1855906329d0ff45dc90145ef85e657038d2cd213a8e120d34e2f1304bc64706c762a3487aee067a5344d2651018d77bf2a69f18b60069f79b60dcffa1d8253c7153e26b60f918af878623e6dc6615f22c0efadbbb1d0236e29838e60c20e50c2cada7dbdc228e522acaa6db217bfae69245d5bcfb5e3fde87009a53ea9c464548442ae66a84a9ff1966a4825e112a05997d6196e57a6bdf040398dce3b15fc78430bb22810aefe8406d5def4ee4921d40fcf636db8110dea728348e751715c1bae99fb7082529720484ed19ae018f4db9647c3f17ff36e5ff6700aab6ec8bb38e5462d5d4c9a26c80cbf4b5c", 0x1000}, {&(0x7f0000002080)="31780f133249a4b8e93c7ffe0816e5f89740d4d09c633522b85b81d33eb170b8d48747690f6e1e3c1953010e7eb62da07138e60ae6bfecbae078eff42fdae6627e5d9e74f0019177286e", 0x4a}, {&(0x7f0000002100)="92c3ad044260829b9b605ce7f0754ada829e76f8b8f46c4f24114d4827b31f51c72865defb3792d9a338ead76fbee24c3e5f25fa6c90f2d8eee896e1e0093e131368880b19188539d3c94255fc9ec2875a204a42d307e4d96507737e4f6ccead78c10fe08ad1123f6b36687d2b24512fb7eb58", 0x73}, {&(0x7f0000002180)="0145af5e2218c18b1ec8414330fc409742890e0f7eaed49e2e504ee16d80d736e89461e2ad0718db6cb2845bbea4d2748784fff9c9b4cbcb34103d3caaba7e5c215eaa77578455668c3d6be7c9b50b2d5d4dc14e56b9647d7dc679dcb66bdb96a2bc5d6976a60845e5286210fb67bf3b60a2cb94f96e92b85b2e6f56f420c5b6df125bf8a9928d24729db14dfa891681d4e355b133ef52b0f23cb7ac3f59d3d6520befd2695d52215a58326b6ffb52be260a5e196f17496da3a5371e2bf30bcd4a3bbac30c390683c29eb0afcc9b25a018a1b8568dcb2f065b40a18b28b3740ba3e53f7243", 0xe5}], 0x5, &(0x7f0000000000)}}, {{0x0, 0x0, &(0x7f0000002500)=[{&(0x7f0000002300)="81fabef46aefffebe08dd9950ed8e4d0d0378cc30f8fa59101b985133e07ad22de26a3c46d9480cec32f3e3688f0ac555a9b67f76c0bf8eeb77adcd715b235f2c2869d90df01d4437261014dc425b5557bebe2df2abcea0aee5999702639b4ee", 0x60}, {&(0x7f0000002380)="320da8fc5d59345b7b868cbbd8856f9b155ece38c93cad64cf38d5f86504d606240ff589bff5dadfc64157eb91ae822ddf953af3f0de9c64c9f72b8ed967f2132bac82c1b652d980d284fb7f739829b31d870e9a706e51b80822af43802ea372b540128ac4df25600cc8eb3ff743bbce95299a32c21858ec59d2d79064da15b3092775a384", 0x85}, {&(0x7f0000002440)="9d84132d293a99911933307efccef679ed044f906b13f7a63e459b59346dada71c7d7fa69f55ee49e206b738279f00dea1bd74b6df07621030fbfa661550e305c373630219b3d1fe92ad047661d70242519e11fbc66ddfd53ac1af61f58d790136f860f509faa65f0298527f23b0410e790ed4053f278d2b4e15923a152e4088505b7f3d5dd4c77634902fc1bde978fc9dbfb688fc70c8f8a925dc7c0d686bfeb3b0a555d09ced6b6807bcfda29a618c6421", 0xb2}], 0x3, &(0x7f0000002540)=[{0xc0, 0x109, 0x100000000, "a106a2e50d368851bea30307161cde16ebba4db08aa0f576746cdec7ffedec1732e5d91a1e16d060d01eb6b9930ac44ec21cc453ff33a35e9a292208c57b73865cb0c7f8551ab9280f02d10831a89b9863ea7f9c43ab0e7ce7ca661fd0acc033309944a8634166029610aff9ac55c806d987ed7bf85e7cf9a7fc75ce829442a516c0e967c1ac529dcbf307336d981281b6723fff27bacb72b7e83ad0a6673242e4ddc6c470d111c414ad05a7"}, {0xc8, 0x113, 0x8001, "9bc9f1983e60b08ad61d51f2a5d676b4513addbb243bcfb353c75809a21b84778ce4c911fd84ed27ae858d6b0ce298d7c065b51ecb338744421466e6981856397e4b69db0070039cae518ad65578a9e91531e9c369dd185483d3dbbb90ab3ebcba5e669f61604a77599c77752636f93b0bd543a5a804ad52bb5008dd3e1ff51df56fc5a876ae6dea8b8f1a085501816083f3d41c13e761df3d7d873ea060482de5d591c3875a0a286d1d5f69f3356d5f2c04f565d78e2165"}, {0x30, 0x0, 0x4, "42a89b73d9d1b6d4cfc5c6e5beb42c1122412f38e7da809c78ee50"}, {0xc0, 0x12b, 0xff, "06c99f6939c04be4a5e866369e9de12046336d32d868784f0ab0073915726942d68a8b7e16654d9aa1802abfdd618f2b949108d2ac3887e44c3543d0741ed477c72a5a2355ec830a3ae94072d58630794d96893279c26d128114171359ad887b3b745cf092bfb53b169ee9feb1b11215bd2590157c05d4372bc323d8971da1a5df5218196573b4f04b8d285d4ad947141853007296fef2e531b2c0b2106fac066cf65eaedb0d6185fd2cc34a1110f9"}, {0xa0, 0x104, 0x6, "5c52c3dbcefa0e8144206d4bd7e899eb88d999d9a4392014276a0ff4932be4d499e3bd65c57a3997af2efbfbdba768833af9612e7e9e2079f19318c5186212c63a454af4b45b61dc4c3fe7a668fb006f5e974ac834f700ae9a8666e315483d32ae0c0837e35fd012ba8adcd1733e6a0e60b9a9b38fdd7843c9c40683dc925ef497174fac542006a6eb7ef9c97f"}, {0xa0, 0x187, 0x2, "ea072a81dd205e3af274b9e6da08c91457145bf9048a8681c086bbdbd67f0693601a35d3f44a5a7e2dafdc49af3b872f67b0ca668c30560f14e6e75fa84b7168fde8f4349ddc0099ba5c8bad4a7287cca2845fe30a6dbe579b4f7ef43955b2c06c528e7604148badefd82d334eadbe4bd982e48e70454eba7720bba1f4237ee15cffb0198993a3f85228"}, {0xe0, 0x0, 0x7b, "36b9173e8bc21318358a9f8d6d1bf1f99dd749e270109c6929af93f9e91a4778e5069b575832559498df648be047ee95e0d501211ea4d25d651e0d03799b507474412814e39659482925f3974fb3d8275aadb7fc2d838545b2480890a9c53709a38136c6503687d5bc7f943ccc3aa1df5b9c946ee0c419b336a754897163422905042359ab5884bb281048c44633617cda9131c7c0d04d3fc2dd1eeb994b3941e5fcff576fbaaa3e671cc06f82779f1414a34458b65b7e7cc23993580c4a2020e63a82face60347becd4632bb7d8a5"}, {0xd8, 0x10e, 0x9, "d0ed35c8422035b950a24bd8d7dee560c37c7169986094447c797d9af953bf95c85d347518168d3e84ef857b8585d26b31ac108c0f2744e0b5676bd8f09c32bf1ea180fd3b4828527e9a040c2d812095b8d53eaac04553d00642585f33262d6415dcffd1d6b830888169ae9afbc3def3718d881df70dc634480d25e579a91193dfd853ee932b5b41aa94a7182aac21a5bea3db2156c1274ad0dec681bb0491e8b209bf7ce23435a14fb933df3715bc1a62d02dba6d86ab7f5cb4102b918eb754ce"}], 0x570}}, {{&(0x7f0000002ac0)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e23, @broadcast}, 0x2, 0x4, 0x4, 0x1}}, 0x80, &(0x7f0000002e80)=[{&(0x7f0000002b40)="e96a7f5bd9af3be1a868fe8f43e9be24bb632cf840c7278d3957a75430086a9b376a90387d51282187196c902a2c3ccf2590eb54915f65faa19f31fec64629a9b5f38dd73e4b1129d0f85a37d33170701995033750b7e9cc2af1e5808af40f733f5cb3006d7331407b2edfe191582238308ba18a7d6214002749ab4672dcb0ea604bd380d491e9941fdf72b0fd2a1964e5dcfded604cb1a88cc1471d7f65c0098524f818f4761729c6154b55529dc53b9d3a0c506b351eb411982ac716949fc4d1ca167751db52830a72213870d4a755bdfb20c185c8f4c1ea", 0xd9}, {&(0x7f0000002c40)="c17bebd86fe0cd794236795e0094600e8a1c4be9a67f82196d4364868b9897317a8f67f4dae2d112fc5bd97122d218c65c36b1211c136f847e335b936564910ed8082ff286373dbe2a0787f7db781984721ca1b6d579508c38d5c1e2ccc68089509aafb36e39a58f98e916c0781e626a911e5273cad6dac859", 0x79}, {&(0x7f0000002cc0)="5d4be42f9bfee84915911543a2021ac16eebc2d2b552372fa9f9ac564b464a0f25dcf15b52fbf182cd75081a08185b68c0bd12097ae7f4c6779fd0c30650176f678a101ec1893a41a8c5916559383c4dda4cdfe89d7ca10932d8a3921c01a398495ccd2093fc5e0b8e6e414fa9ca6945e1", 0x71}, {&(0x7f0000002d40)="c6e86b58f45a4b", 0x7}, {&(0x7f0000002d80)="d61562fde4afc18dccb41cf1442ee76a429dd27db6b9cdb00e1633b08b61215b612580a65304eaac720c10f04f60dfeffe6918734aa0f0f6719b2a7c318b45db92ef2e3c35e8f416a438cc9b6f2494a9c4ea4bb93275aafd9ee96552c278090683d6a6a2faa526978a17946db0cca087d984bc7eabd3240ad4b22ae4a1928745f336a297250faa4ff83cdd4a32b378951ac3da5bdb28185923a3ac428a560ac98f53181540f3db20ee6f9a39312aa87367d229926c1c888eca1613b8c9997a6d13fc08f1bbd850a390aab905770f0e1879e867c1c1e34f31f954d6acfde21c4205663fbfcd6addadf0e165", 0xeb}], 0x5, &(0x7f0000002f00)=[{0x48, 0x1, 0x7, "8f9630f8bfb1bdcb908f8dbb20e376d2cca4c8db20100f80f5f5d4aee1dadbf1b2911adfa47a9813cf5f199a361f8eba943b2cc87f"}], 0x48}}, {{&(0x7f0000002f80)=@ethernet={0x307, @local}, 0x80, &(0x7f0000003080)=[{&(0x7f0000003000)="90ba426541f38266985f9c614f75a5bd9b6c6133ed5df4ec886baec12c33f4f095d50dc932cc04af8265846b06b185c17180319716", 0x35}, {&(0x7f0000003040)="050d651c53af25628bffae94fbf69ded", 0x10}], 0x2}}, {{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f00000030c0)="465c71144f4dceb0e6d32980286c6ab330474caadbea00b55e92c16bcc319ab30f7cd6c3e8ebc569ff69563498a91cbdb638423950b9476283912d8c1a6a5b4df7a2165a8193ced149298ad6334cf15de2387a0fe6ecf0a0e436037352029282bd15dc9ada123c2356515d67fcb885905a6b3902049e4a00d80c268b4da1973607", 0x81}, {&(0x7f0000003180)="6c748be170287fe77f05f26f6b141c9a78237f38ddb7e6ed1b3f0238b2c197ec6cdebfe5807cd1ce8508ec8fa200ba777e896cea86ff448586b04a0049a1e8af9db1c0196e3dadc19a45", 0x4a}, {&(0x7f0000003200)="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", 0x1000}, {&(0x7f0000004200)="f410b6c3d2108ae3a08b6ff20944b93395030be9b3c550ab4815758f264e2b6a4f5efec87849c01ef429f9415f5cfb95a3067cf8fc695137f2c8cfbfe14ce9ccf749325b7d357244f67007dfcfee19a0db7f5d1c099c8dc2a4ea7b910f68d5e3b1ea0debc1b85c36a993b68963958f10025709bcf8c226807287830e038acb0c2fa182346ce9137a84b264131273bec1690dd1657c13b8379419d1c926a852f97b35baf1feafaaa1df944eb743c89d69b4cf8a1ddf0f385e0c2d87404ef66fa5177f757869a2bc3d08564ee0c669603a3f4d8934a360e14504", 0xd9}, {&(0x7f0000004300)="c34793786c8a9b6586f97c7eda877d75956013535ff8f6", 0x17}, {&(0x7f0000004340)="1984ef0eb180ebeb374a9301d9e967c6c1e88d3c1e6fa0ecc75b7c019645f14f634c997b2ad9572c4b2d7944885f852ab4bbadf14223", 0x36}], 0x6, &(0x7f0000004400)=[{0x58, 0x3a, 0x0, "6bc6c38877e31159ac8684c592ea7bb5152819674a650ad1a26b4146b8a33dfeacdf922ff6435879d7b6959ab90e2fcd853f914147350da9d0d474a0a862aaa4dc"}, {0x60, 0x10c, 0x80000000, "dfea45f356412d5a8e2a2f558b3f4f742241d2d4b806ef33fcbd5f79dffad75ecdfc345be564442d93563a794e34d1fab311bb1724d23289adddf5fa0eabbbba3710a59ec7d50a026b"}, {0x70, 0x105, 0xffffffffffffffff, "b089c5b4221a55761310392cb8976e57dc15ae509b05c54294de4598735721a24849cd89bb5832838bc15e627a91820c4511d2378abf5ff91d37f286215683d6ed3f233257271363c155b5d2f5ce3895155d78a03031e281532020194a1a7c"}, {0x1010, 0x0, 0xfffffffffffffffe, "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"}, {0xf8, 0x116, 0x3, "0c441840de9cbba3f1b7d209272024cf7a28f6e931a019b46246907077dc7376f39876f665adcd3b008ffb7d10f87b825d2ca64dae43e89ca14b21bb00ca452c8ed7e0c821564638b0862fc9d9483634dc8f307bbfe0686e4a3dfc0142b4bf2322862d0abd5a2bffa91e55123c912ee12855c392c17415ca2b50d781bc673bd8a2d2400bce7e5913ada6becba8da3730f856742e00c6bab98e8dae1c24225593113784751d71259870afc57ffd3dd4875b1b1c52077022acf34d09b4251d314263e64720d91431cdb197c497749c00c556d1b5750c28ce160b4511cb53177ecd3ba82f"}, {0x98, 0x116, 0x4, "31fd62415c2e6e5b8b6d93f1db22cff21c34e498448a18ef3409884eedd27eb2a61537c64316ac0b9d3041595ed2a8b7598e5dc766663427fb3fedded70f86d9c5224060a2fa79afa930f499dcd76fc8873183e9d22fd83d58a5d104e31049764e73edf48e1f23073e5476da46a874b7c32d814da73cf4f8d6eab1a5590dbf22c9767e8866"}], 0x12c8}}, {{0x0, 0x0, &(0x7f0000006b00)=[{&(0x7f0000005700)="1eb7fb7d426da80564e2b866123124d2b26dd7715c5578786bcecc6f9cab6135904f0510cd01a4ea40b11eebc665fb094a05d93a348b55b8bfc2ce10eba6bf79e836da5a37d936f14d33f37136dad548a932533a566b1ff4db", 0x59}, {&(0x7f0000005780)="4d110e68262091f0df8603dced7a26fb5b2a0eb751936c58f5c378270a79dee4d7b23b1104f5da3bcd94a0d45330e191278283d150cf61715af1436a22ae38deb2f0c171177f5db90b3c4d8ef7b0d13a6551820b8b802a6c478acca31fe2", 0x5e}, {&(0x7f0000005800)="503702d83a16b5835c270999b86d02482a77f4276743c2e6613151b9d0957d41b4cc0b8a27d1bf189d1156f938a76002a4faf7679118b29cd8e7fdfb769d262699ef9e14ebea7e36ff3ced7221dd4adc4a1b595aaeb2788e3ae92a6290880514561ac173fd8e9371", 0x68}, {&(0x7f0000005880)="0643ae9491f2f19ae6167ecee91537d8c6cfe19aaba7cd69548701da7de94a79da45f0d9cd45d2be23078cec97c9081719a3f68632abf09f74f90ad5f7bea7f796add8c82dcc6a2115ccdf5d99b9bd34d443ee54fb21e5c745de42887d17190b3942fd540148d8d482b3ba59390b6927306f4d349998a430c59dd81596772286ce09f659b8c6218f22ae43f52da83c13e5c86547468d209916d192f5c05f089adec712de9c", 0xa5}, {&(0x7f0000005940)="615a6c9ce780be6865c827c88eb6bd68d0493635de1b46ca9643e885b24b3d1af85da683662dd5d79a0fe5b3fe33e554563939d00c2a35af6362abc4216587ce762372c34458409d8f6c9a8cf40d3eb535311d", 0x53}, {&(0x7f00000059c0)="bed2fd9268c65eba281fa4844605e1e5138f332667b6d3e568cbe08f8b36921796857f03c3da71955872c3624624a3f367d3df2fbc8d26eb9ff0751e85ce5940ce6cf9d10909b7577ea20d4c6a662b6f3613c5631d74738e02fb711adcad5e3ea3fde5f32fb5b9f72b2fcc1f197613d2cfd8ce0852e9fac0c2c10a5c0ef2336ffcb65a24e0840f6ee04e6319d82e81b66cfe1d8b68446ac72e48b0b49f227b31842a8e0bc4c1725544712c822988b939861313bdace991d838c2483c963a30", 0xbf}, {&(0x7f0000005a80)="99475a4e4a12870e3831bb912722866978cf", 0x12}, {&(0x7f0000005ac0)="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", 0x1000}, {&(0x7f0000006ac0)="8eb60466e0585b", 0x7}], 0x9, &(0x7f0000006bc0)=[{0xc0, 0x0, 0x7, "fdc3d02fdbddd44d14c6d2d044aec8b571c4fbc808be3384884e405e06f032f8ea0ea7d0bc615c926986f78811a5062baf921d22e1d974d64081a06c3dedd24bffb5850f2a4a8e422e0bac5cf9753342fef956fe6d12203c6797a7106da824d5766d21df2e590e11b13e007275c6a0c7c00538041e2b3c8a21c3daefa6616752edc7a2cea5db40eca371f676a0222ce7c12b76a16b249e3f2727df8d614f4630e25868ff9693b111d82b0519"}, {0xb8, 0x0, 0x0, "ef6515edcc985cc18dec0c7975efc7072cf49d7c6fefbbf86147c737075f331a03a738853f3e331772506e3dd91cba46bc7645cd6502bc5f2939b045fd8ba862a9edfd0762ef5d1858b92bcd6d3a098de7d7fa1dfa07bdea3091a090378ef29ad535492571a95b6995a67023d23d110d79862e3a9ae82cca6deb048ee8a28bb11313d8fbd0c018c6d8753bbde36447eb6863c9c5cdf5c4caabd601a8c9152221e2bc1782"}, {0x110, 0x11f, 0x3, "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"}, {0xc0, 0x11f, 0x4, "28fbee0857bd1cc099d5bedd99ac4c1727690274a0b0ea2103a30330150fb3bcc9ce2e30b005cd80a381d8368e8b4c4afcbf219979e0fca6b9511bc18f8abf8e2dcd8392cd7f29bc8fb2f674df3ebcac32f69a3a17ab2dd2390a6f4c1be2ea02fe0303832363b71724a44effdb76379429e16fa08e75fd75f7a37f6db484b4214f278e7917ad30c35169cd5392c234ecd17722b35bde821d7c2dcf1aa1f2983f201d6b33780c8ecd9def301c60970083"}, {0x18, 0x101, 0x4c, '}'}], 0x360}}, {{&(0x7f0000006f40)=@pptp={0x18, 0x2, {0x2, @broadcast}}, 0x80, &(0x7f0000007740)=[{&(0x7f0000006fc0)="198fae88e18c11db6d7ec6ea0d7af3cea82860df27b356070f626776f8f3b45ae5052160a8aa49561fccf12520d195b13de0b40617e80c536b94c6353f554287b0c194e0e7d3fb38ff16d0434bfb34beeba8079750a60f0c8d25b3c3c21dd3631bf7ee85ee7aad33761c1869964671769d013a614df3c6d443bb5c9c1428400ca7708a41f5806d1c827c0991b03a0e45b28eff7b1807d7dae9c8a54549dee10ed9f9adfd25140cd22fdccdc6b64feef5ec79db74412fb430050df10043e45c3995f900b2894ee388fb8397d54b12b5db63eb6a7ebd652c6075d11c664d", 0xdd}, {&(0x7f00000070c0)="ec63dd31970a9f22a2ad04106f42ae2545eda1d31b4f2c35a83e606b72ec0d696305ef8dbdd1887af75f9c1b044031d951074b9da89b3fd6263e8a6aecd77ba71d53ede62f61bc2924381a189990b35363fa7c0237c76419416a928b0b31935250b7d32ecd27820b4186adab9ede3bbac3e934e319a687324273de7dd117e7fdf5911f75efcc0d10ca16219f162da5c12cc274cb610a90ed3dc341cc0440c568fb12789236126cc0c643b08c6df27d980ce1e73a6af16e76743f98c92a85f8ecde5eda16a2820a4b7a99b2c749ede11224e8ac", 0xd3}, {&(0x7f00000071c0)="433d8235a94d6a3727258477c5267101514daae60a98b995001ec820b88fdf56d175557bac5464fe0929bba2a817b0b3ff667720ffee9f57fca3efcf4ee0309a0e224605641b341490ad01bc2535fdfcbfccc41e3cd562156b7b1ee7ba11dce55f0191a58f606d6e0d846c133b376e20bef23104c0a8e719a6954810ec2c074dccf0a131c7e8b688c1d0b3fafbff5d84d6e5f059abf5a2613311074f778cde9b9550243248ff1646bb544a7172166f2a82f4b1085eecf8c4e68f265671472845d41c73328c1a92cb888bc74d231c76ab61afba2ee9619d9af10349b018907a4266d8548c78efe1af792e5aa1c2ce0e66296e8c44", 0xf4}, {&(0x7f00000072c0)="5e43e494e5f52bbdb18e98712d5d75e41d51fd0a126d9be47527b9599b9e4093dcaec426bed9131938d6940806831ec0faa1a78e5262ae0f4d7353f15f0c5c8e7343bcb7bb1ec01e878de82e1d6648cc8166d69c9ccc73f43d6d3eff13cc1b6a230a7d27dc306765b12dc5d9b61f7fb9be4f01741e99435fbf6d5b85297adb73224a7170d691f99d9a8033c44d6b0d363eed92f925428337a6706f9da641372a64ae06be55ce164e8aba7e2450c51de1b0cb9617f7dc345e66158dafc04e4c3f47200d5b96", 0xc5}, {&(0x7f00000073c0)="ae00a8323c734ac3736c03e3133da1a9e56ff9558d4a25aa461eec8543505ae4dac4a31a4cbaf49331ec41ba1cdee5b7fd4ea75e023816cd1c6a3c178f84db7595986be26bc254fcac5c3875b45ae5f7cac259af92cd73a289de7dc07edecfa67463657d9b67a3815944a9d79f51102585f89cd8b992f0113e93ae88768ccd9f7ec4e7928a2936e2875f221b92d1c04229d30781e1e4b036ad948abf49079468377bef73a961365392488ef5ec02a268b6fe", 0xb2}, {&(0x7f0000007480)="4ed914b9dc17212cae799a3134c3d7317ddfd97c4b051418ed42ac9c01f754c33c0a6532e2dd624706731e46c9b77502c1764bbb12afc2e38bcb130e567f9d602627334d2bea7dd108b91abe68a7333e21bbbb4dcc8c2097ce7e3a70a132adf2e55a636a09b414cf4044ee75d5112a1c7601ae6b17d2e78142addfbac0b5fcc5425c56c642f49132a9bc814d4d72daa7014f5d8971b4ae8aa5f305f78a4a734057bb19e23c838fe6fb832bcbe7358b3cac5f3e2b14a5cae39a557a07241d9366fd053e725d8d59ef2fcc538b5e4c2950a8749f8a6ced4f4a449a33c8ed512c156eee9525", 0xe4}, {&(0x7f0000007580)="11bd8e72d1c245", 0x7}, {&(0x7f00000075c0)="c9cd87aa9e9c2de4eb0990f0d48a12e9f51301576f4dceff1cda3f4b07de2e020fd3b6606b6a84dabdc70d852622e38e0c521d3902c032d80cca3a853014bb0c088ccb087f792ebbfab18b84c8cb421d2c995638398b", 0x56}, {&(0x7f0000007640)="7c40d33036bddfe0e6824fa009171568788719edd0ad1a94dd05be3c63b2906b18bba4668018001b9951fd03da575378ea5fe573b76c53a0665c72d527b59791389a39e406c2e3240d215d59eb6e67072396dbfc3328f441967d97cd4bbea457a106a0bc86e78b1b2f85e61f97cc87a4689bc43cc3d56257a65d189ae91a3e7f303faa3e6a4d5b90362ab417aa38d5e7c9a133bc4e626776910ac7847dd325ba30cc34cfbcee696a9bf25ee1a862f6b559342a71d70353f952ac046a1c7bfc8a606cf56e6ff2b66b4e57ab2e0f9ede25a2d2db23c0711e134d6764e9e1f651793c8bf518b04b1a7094b13f549592f21b", 0xf0}], 0x9, &(0x7f0000007800)=[{0x98, 0x10f, 0x2, "c324322c7bf8712c7970bfe2e52d268e95b4a77b187e148596f499c39a71ccb791b09aad4af11f4e8df311280ad35450f43d071ab2f82abc23654e7b2e5f4be0ca72bfb4165b7579e39f5c780b35b9b280aa9f8e1ad6452de91672390cdb2bf42781c58c3d0e3b54e3af8e620ab764193cdfc843394daf6b41ee853839fbefd810"}, {0x10, 0x11f}], 0xa8}}], 0x7, 0xc0) 23:18:01 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], 0x0, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x8, 0x40) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000040)={@multicast1, @broadcast}, &(0x7f0000000080)=0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x80000) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:01 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) openat$vnet(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-net\x00', 0x2, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sysfs$1(0x1, &(0x7f0000000140)='/duv/kvm\x00\r\xd0\x99\xc1\xd9\x15\xf2A]\x91\b\xdfz\x0e\xbcU\xe8\xc1\xb4M\x9fmj\xf5\x84T\x9al\xaa\xb9f\xb0\x87\xdb?\x82<') r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000000)={0x7b, 0x0, [0x400000b7, 0x10], [0xc1]}) 23:18:01 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xaf01, &(0x7f0000000180)={0x0, r1}) 23:18:01 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5501, &(0x7f0000000180)={0x0, r1}) 23:18:01 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha384\x00'}, 0xffffffffffffff79) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x900, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000000), &(0x7f0000000040)=0x4) bind$alg(r0, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(lrw(camellia),tgr128-generic)\x00'}, 0x58) socket$alg(0x26, 0x5, 0x0) readv(r1, &(0x7f0000001540), 0x1) 23:18:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, 0x0, 0x0) 23:18:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x14) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x80000, 0x0) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x1, &(0x7f0000ffc000/0x2000)=nil, 0x2}) listen(r0, 0x1d7) r2 = socket$inet_sctp(0x2, 0x801, 0x84) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x12000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="04002dbd7000ffdbdf25020000000c00070008000100", @ANYRES32=r1, @ANYBLOB="0c00080006000000000000000c000400c595000000000000"], 0x38}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000) sendmsg(r2, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)='#', 0x1}], 0x1}, 0x0) 23:18:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xaf02, &(0x7f0000000180)={0x0, r1}) 23:18:02 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x5502, &(0x7f0000000180)={0x0, r1}) 23:18:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0xfffffffffffffffb) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) sysfs$3(0x3) 23:18:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'lrw-serpent-avx2\x00'}, 0xfffffffffffffdac) ioctl$TCXONC(r0, 0x540a, 0x10001) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x20000, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x8000, 0x0) getsockname$tipc(r3, &(0x7f00000000c0)=@name, &(0x7f0000000100)=0x10) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0xffffffffffffffda, 0x8, {0x0, 0x4}}, 0x20) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:02 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x6364, &(0x7f0000000180)={0x0, r1}) 23:18:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x40044581, &(0x7f0000000180)={0x0, r1}) 23:18:02 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x8001, 0x200) write$cgroup_int(r2, &(0x7f0000000040)=0x8, 0x12) 23:18:02 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940), &(0x7f0000000980)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:02 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x40044590, &(0x7f0000000180)={0x0, r1}) 23:18:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000}}, 0x30) 23:18:03 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x890c, &(0x7f0000000180)={0x0, r1}) 23:18:03 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='oom_score_adj\x00\x9f\xc5r\x0e8J\xdb@\xf8\xbfj1\xe8\xce\x88\x02^\xb2\xf4hTR2\xf1\x89\x1e~m\x19\xc9lG^l\x13c7\xf7$\x7f?9>b\xe8/<\xdbj>:\xd9\x10\x04r\x18\x15\xdc)\x10I<\xd0:\x0f\x18\xec\x00\xc2w\x8a0C\xf8\xa9\xeaa\x16\x8c\xe6C\xf5\xcb\xdc\x1c\xea`\x9c\xe1\x8e\xdd\x8e\xaa\x1f\xf4\xaf\xa3Z\xbf\x17M\x1a\xff\xb1\x8dP]<\x9e\xe1B[y\xe6\xae\xe9I\xdb)\x9b\xcb\xa3Wlt\xe9\xa9\xfc\xf8\xde\xf0]\n\xa5S\x16\x1dh\x88\xc5\xea\xcf\xca5\xd2.\x93\xfd\t\x90#hq\r\x9b;\x83\xdd\x0fs\x80\x12\xc6\x8e~\xd4\xef\xc7:\xee4cu\xb2\x03\xd5\xd5)\xc9\xf1/\xea\x95_\'\xfb\xb9\xa94\xca\x9e\xf3\xfb\xc9\xd6~\xd5\xb7}B\xe5.\x86\xbf\xbb#\xb9\xf7N\xb3\xfe?x\xccX^\x16bz\"\x8a\xa45\x10t\xbb\xb7\xca\xa7\xcc\xde_\xdc\xab\xf2\xb8\xc7\xb3\xd3&$\xbb4\x81\t\xbb\xe3\xbfB(ln\xbc\xe9E<6$\x8f)\xb0\x1a\xc9\xe3\x18\xa6\xd9zk\x94Z\xed\x96\xad\xe2\\\xcb,!\x13\rv)r\xf1\x00E\xcccgr\xbf\xd4uB\x9f\xa5\x8c8\xe4D\x0f\xd3Vtd\x89\xc8V\x14\x17=\xd9\xcf*\xc8\xc7\xb7\xcc\x182/Jm\x8c5\x93\x14\xfd\x02\'\xe3\xc9\x12~\xc3\x10\xb7\xc7\xae\xcfA\x823|\xfd\xba2\xbd\xc6-\xe0E_x\xc7i\x8dV\xd9\\_l\xfb\xd8xX.N\x9bd\x91\xd5\xc1\xa1\xbahL\x95wF\x13{\xfd\xc8T\x1f\xe1)h\a\xe8Wn]\xe4') ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x5) sendfile(r0, r1, 0x0, 0xa) 23:18:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x2000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000002c0)={{{@in6, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) r3 = getegid() ioctl$TIOCCBRK(r1, 0x5428) r4 = geteuid() mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuseblk\x00', 0x420, &(0x7f00000003c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xa000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xf0}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@dont_measure='dont_measure'}, {@uid_gt={'uid>', r4}}, {@dont_hash='dont_hash'}]}}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r5 = accept4$alg(r0, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'seqiv(aegis256-generic)\x00'}, 0x58) readv(r5, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:03 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x400454ca, &(0x7f0000000180)={0x0, r1}) 23:18:03 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:03 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000200)) r1 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt(r1, 0x4774c766, 0x7, &(0x7f0000000080)=""/132, &(0x7f0000000140)=0x84) r2 = syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x68, 0x400) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(r2, &(0x7f0000001680)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10004000}, 0xc, &(0x7f0000001640)={&(0x7f0000000400)={0x123c, 0x1e, 0x8, 0x70bd26, 0x25dfdbfd, {0x15}, [@typed={0x20, 0x8, @str='nodev%lo%^vmnet1vboxnet0\x00'}, @typed={0x8, 0x1a, @uid=r3}, @nested={0x1200, 0x44, [@typed={0xc, 0x45, @u64=0x9}, @generic="1f3c1e67b2aa70f1abe5c7a181e056a73ed90de3324b5b4ae6f220be18a1e17988dd4ef44d84927c661f0aadba19d7ad18e3aaf18f7f89bb03cc173fdecb847d379d19933e68c950c33265ddf0b6a41dc92262a13c0dfd4d62d48bad4f8ac99c26c417368dca63dcc1d465a3f49fb5ee379804137f5e368b3e327ac2835743db8f78146f951edf30a87f484a31a2767bb20ebfffd12fac3dfcfb9eea6a94c5a2c138274d41ddae1720c1a447b7295a44158b26211b1eab19b915180a3a3a472c51166f8fcf99b2", @generic="f8ba84bd42cc68119451ad334acf4e23dd3f36239805cbf4833f5c7c3afe1f39dba483dabb6d49bab92aa7c52daf562406d790acca364e55812936c59c623ccf9284419f8dd65a76f0d224b362e2c7a84faf7239b40b7a498ebd3d4b386b5d2d28785060e479499211016fb6b7e3f303aea5dc93210ba5259dfa39de3dcf393058271be7bbc1807287a5ca3e1f0613b80995db1fd537e0596056c770e0e20ad13c678dc65330dcf84b71164e1bdad55ae4fc2eca42abd08542611bfaf84df5f9adb322993c12a76be605a6625789c1", @generic="11a28694c014df9b4c1f", @generic="40646a154c66d586d1336e6df3c2614ea57a9466a6bbabe3d6e91f6aae7a65ad14d63784b50acd4b143fc1badd412c911add0ebee91c1d8f4137530af8ac4ec121f90759ddb7cc3771c0073053c98eceb99625ee7dc47a8e3d78195e33347b132a9a90ed65033818d64a9fdf467489bd63acd2d078550742a78026318042362ce1d1a3adb62b939b79486aef5cf0638aacc8417f700b31c87eb58294b2622283190c7f2f90a5633a8c0b67c19b69a7051097ba47bbafdafd9ed93a4f3a30caecda598a7631c61311ed3c92a123bac6d42b8f54086f40db0d2aed99f6a8ca82f9e0089e1606785b8e7a77d2e0a4b6fc1a0c388b7fa71773afc1fe246e70b31bbc27f669c0b6bf4fb722b51ca8496cd550dfeeb3f5dfe98c999e07c039d1cf8336b4486e331c95f243e8e9697da039b99827d65a8fc7919a466084d4df9a0de9abd9640eb13565cf2b4f410982b636a949600c649c1e8078045fbe02e5df6ae94f73014d4e48c2da06b55f9337094cee902c35d5ca3492554e88651a38929aa158b61d318f1244be18d7f82e597c509059092108c746bbf6881fb9a4e62a5b109d65514b1c3ade55eb82a85d48c261b84789f09c2cf9c7f4b8bcb6412d5dfea6769894d85ad5920951ee71feedb21df7733b89cbc42a3d415c9fab79ddda8e18f3fca3e0b5ece88a6d1f2b5c4fad8cbe86a785e43238111d812b75b0b01d74f02d723353733a6997e63766c8638d77c7d4c5bdd28895ed9fa817797d8c882c76a68c467c7a480fc585e50f1e0f54aba5de1ab0773976c76578864a056475ee2eb246dbf9f3cbd938052c662b373723cf0224e476b137ca25e30bea8d28f5328aeaaeca22b002f4064a38ce2cf5a741b98ec90768f309f4a5b0efd5c941b16ffa026663b98bd502dd698d4920f779be2bbb36c5dc1aac30d3ff4f2b032606ca11b253117ae67e12f3684927eaf7afb82aca338b3fc9e1b56d92639b06917d3d75e3e219dd022f31e0ca035b9587a2e7bc0a236b6550b0dcd5b0d214a37e2fe849d944de3781f0bed9baa5099bd6ce3d19c5bb3e2251c01eb10823a1c00eb2d010d79227b575d89b4ca98c93364c1ac57a00c42d7b0f23156636c071b603945863a22d5033044ea9ff8de4aa1ba0474f01a236e14febba231cef727e05c7dad6a485e6b9c77db1d155e0ef582aaa1a72083bead25aa00a3f89f90451d49bea52dff7f98da42c70878148982893d794ca826ad961bf019a8f8ea452f907fdc42a786dd7383b8488fc378e9a59536a7b6b0721d9c0f2801c6f483ded6128ba04636905204576127f7b5c234159aeb95cb01471bfb8ae9966f61653264b0cca6299079dcb80da888bbcbb23f2f6d310de6bcda118b7e31294847f68301d9327214340722754fa78946ef4aca9006e1fcfc04253fa4ca57e3de746f87349f0c631deda7f16075b5d30150933b080ea826f6b1799c82f53ae3ccc54085fcdc0944bc03b12959c8850a22c6755a7be5e69208bcb9e2cf9155d4190069e395e88f52f6042fe4516963cd344913b1bcfceb354995c4c0acbecff8ecf528155a008481e0a9f7a6e3e45950aa126c160cdb46212b126a5b4cb153a1a102f99c115b41c040b700fb155dc0810601473b470095ba86909931e4e71b14bee75bed8a0bdc958aa1e4dfcd2b3be59547575a318995fded4668de996f6aedca45e670ecf81a3ece79bc23ce168b08d6c414e215240b30c1c28d1a53474e37c316dabf8bc37847fd86d3305d143b91472ee0cb150140de54dfe7737046fa7a8686e44d7ac2774e9e172966475322390314f8f1f5d41a07e5ca80d0a56d03d139da86ccfb71167bfe44efab3a63182e01c965763f555637b07ca5f7dfbed382d77dd396a4b3d8e526964107d637b051c1a4aaba8d43456334825fe3c6868565a844cb4dddcde81836470ef73bf40c49adb79de148bed230d990b63a8ea4e68ab71d8e73217d049ba755354f5e7cf64e4199d1443ddb5fc6b05ada6f00041962c2d4f87f2ba38e4324ceeef4de6cc2382a1cf6416024ad73b61e509205773befee34e79c678b483b2becb5f1b8ec367355decf790a1a7166d6e527424fce303401b119348284f04de848a000ae0b9fce0b4bf07044b26b3f087f947f3f8515f285cb0dc6eda0b18704f531fbcad16ee22048caf9d85668425fe53324e120e991aa78475da2c27a33a86fa748ee4de5cf9cfc19a63a2c7efd38d8666b296b8c6075f85c774f71c76a6bc79f2b4787382a72224873ad86a0c4e95bd5f5c23e1b8ed6212bef5999a66340ec83c0598c6986c63b8fd35c75e4eec9bfd391ec66e7d90eee3d9acd52038e349aba100303af09513c680a59181f0d486147f4d0a4510f4ebb8d672cbd2e55cae03f3bd863d15dbbd696b57c16d8c7d8e98f9ba39e55af3d52324051f4b69e2dadc544765ed7d6025a4ae467bdac635d9637f2a30c9dd7765f7ae0c44bdab22dd7e03ca0004f463558ec5035183f76de717a94f7c9205eb557297a7c1147f5d0ed5f619a7b7abb39dd254f4073aeaedd6dd3db6b35cf393816c9a7f1f29526cc0c08f13b7c39b055bf6a5c71bdf33c062589fa802c85a8d667ab9569b2747c841c08b37f550cd38f56c3718880402c4a533b0f7231f1beb1567fc34624d54edc12b22d48f4772e93cf2321c363919c2dd1cd292d6d6d93514d088b5462f1e333a95b0e050494e9a274547ce01389c3faea8299cee696868734d30cbe320d35a399691e3c810612b3f9760aba621062e82ac405b25dd979a287246473542f1f1ed7e0cb8fbfd80366cb437b0f2425802ed3d843e96ce99ee380cd7c617c4953c892d5967fa94adf715793a8bc24129b1d0846e040b973021b3dc817f3c35b5445bd6648f1b9f15a6baba889af2994fe04217f54e8c65b58e021698cca98beca8b835f8cb791a91508079fc3c263596c1be35e58cf6ba03b717ef3ece171fbeb84a62628062ffa90e4c6e7f057d4e17cfc188b4838854782ae9d1db1224a1755118c4f05e0d12422077c504829ae6725241f37a35e32862196eb2cd5e44da74a0bc52abb77032d0a8f6af332a7d3603abb9a04747991750ae1feeba3eea78df58b8a15da10f70108b8cfa870835ef6e681899f2b5c580fdc43efd8cf9460d5615f6beb2d921bd49fb5225a70ea6832e8cee279dd327788d6f1945600dd02a26a1ae8f3eb5798764acb4b8b1684708991b50097b64ac0b8999afecec065ea89dd7b4c342f5412172ed8b1f3342edc8b244dd54919d747692eac9dfbfa8e55b7c29bc965f5b3c0ac6da32b15d14a76fc1c60c386028955791f6482f8541fad257743fc1ffe690eb1e5845ddf38f510f8ca5cff3b1de1267ebff80e416411afcab26a4b8a15c3a340815fc3dc6e34c0e8e4b2e557ba4ba00a5c48c114524abed533313d00731f87e2ebe0f1379e83e789ad7f85cfbad7fcbbf3623b005cf52c4fe446c45d83c976650451a57074243ec3c848c699880c12b5b26f2882fea568add30943a6e82fc386a3ab6701ac3335fd03431c85188affbf35eccdbdbee3ec4b769219f07ed1c7512b5b5601361466c69d54ad72b2c1ee1efd7f9e58395881b63d2b1e2ed43750d36c8300f97932765d61f83f51f67d2d9bb9a60d1666985deb9a0c2e90d8c9bf5acff9e018fb2ea3e5e696741d4f52ad5f8fee70a7775d93cab4af4669f5bbd434ea67082ba4882238327f8aec50b7dc00cd135c75c2fc40753e87c3482cd7e280da5b9097f08da69ddee3d9a062ec1f0c20a2c950a6f6e39b746812721f4be4c51263d884d6b5941af1168f95cfeecfc3646ad4ee19107fc30e5395adc5dad28d90ca5a2b5821d6a93c0cc21c8609010903916f5692be3b83e55497dc7a693034bd2ebf70ac9d1c9dd1f230e6f51ab5e51d8ec83ce5e9da8ff8c86dd7fc2bb7fa3ea0d000558254170700a69e7a1056d2332a46f9ffed925c52277a7793b9c2e6c7cd281eeb985f7837b6ca497b2c473d274c6bc09dda07e7accde35cf41251cd50ec007e00cedb46aa8c75fbd34042964c544ff0f60dc11df0df9a6f64d7c8e81adb69972bf7d7258fc546fca4b6647dcfd925c8819f01ffa38eb3aa3062cefae98f0690a4af8764c313d0ed1f7431113d78479b1656457939a849cf5423887cbf5bb8aa9b1df30ffc47ee250b64c50439a55c2c9483eb1b6eed268dfede90a557b23a0dd33a094a100d8eb39efc498275af0bbe3cf7fc99038796e7d039598268d76ddd8b53971036daac42182a739c8d7e4301bb5b724fcf1ef2a4068d0da1c61ec666c0dd6387ff7e8818aff8d7ab6c69a12cf581c2385ddb5e2a57f0755b33e89abb1e2eb16a9518b0f283b67f8545f04016b4444632718b5da2693ea2ead88e5e07f3d3d70b2ac952fbe7e3c187aa1e99bf51ed1a41d8c48cf4dd9aa17de1a26586055cc46e72ae524d2142f6c667b923a2efbdae04509de41b240599c0f0c0c2aefb07fc63f7e2e0aa276e0e88a0f6a57d28f28b2160f1b4a9a6dedef10b2d9142c9ca3c3c1fbdb599220183086b20032ff82ee8b7bf42a1e3d0ef99af7b31c100b4b6bc1d8ae9c98745caef6dc8b437fcfa23bf37c1e345bb9b717d23de1636fc4be395cb7ced27f9c3ff358a35322804c47eff0b88594ccb9e0cef95f0560329c75f7663565ea4c292c640620c9b0cef77409071eb952c5de382867875c695095ecc2b0e452ff7e43368f988eca34f2d6959a296cf2cf53b6bb3fb2ca40560fcb3c0d21824b26242bd2f13c07990cb43f1de53dfd388915f179fee00387a1eff41a60421527f530705347ce498289c6573a7b91685ed25e5f6f439ce839fc80f4b3f35e5cb1ae75f476b32b11d6c81608902ff9931db4fd4bc792b5f64a164a64c043935ade6fd87f9f9652b555b1e87408ae83d0baa1d1a70faf9ade3d4b72f27df54687cf63f569a355d6978a10a529fc6b66fac3e9409fa04c5d8ecdf44dcac7198825b92c0653fcc92aa9c25b15d42915cdf73b6bc8c2d5c7be4e5eddcc322b77efb53767e48305311193b4c82a7ada26ad5408cec93a1237ba8243698d019708ab07f7a48cb4a2d050c177174d2015b553e95dc07c81d8cfb62505a70ca80f079e9716b7f0d55df4078aaf7071c582610a127176668cfcac0e9ef3ff79c115566434e5ba14147ff4b5a69e9a7047113ee520ca099baf78a8fa0cd32d3ba8425124e3f36dfa9ac66797fbed3b68c538161b76118cd508dfa560b4f6b648534500e1a6284d727c87e00d56dfe60c6936646020a3aebdb229b7756cdcae123e414e95adb5de74e6d67b151570777a6ecc5e3b5065101635c34064e2a4b40056a8c2abe428ce8cb67f88d66cf824c7dcf2792f984004c77341ebd9dc83d787b278edd6c9d295fde8da064d714e91dd4f20b6f2e3df55a4f37d9f28c5b0c4d375e59cfe5cf1a04226e8091345c5c339303d8b85ca3b525d43cb740e3125e7dc0b5a726c21bbdd5dbb753072094886f3549700c0232be371d1a457530cebe10de6bce99770fdbe9f93f102ccd74fc2f7edca1d741d87ab984c3ce67b1110ef305d0ac123381f494cd13f1137c440c604d0436cbd17b24724b6d97932d751fc07a5d35a98669d36b7a7fa1badfac0abf6663882fd1a303d3fec7a67e395f8ceda27c978798816d31e10f9f701f7f5a2054db9d3b7f37f143ee32972634f12f16c2d622abaecfeda048ce8ee523babbabd9085a256c89925195448347f21824388882086d40e071883670a93a12f8e6c4b9060fbbd916ba43c0c", @typed={0x8, 0x38, @fd=r1}, @generic="485337b3d555eecfe14c96c2463240e3724597e03a138d0049c6b03ef642a65a0df61ed18d3bbc06212869a88c84a03383337ed1e614b81ecc86b5f88b10667602b6ea08d5155ce8"]}]}, 0x123c}, 0x1, 0x0, 0x0, 0x20004000}, 0x40000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r5, 0xfffffffffffffffb) sendto$inet6(r4, 0x0, 0xfffffffffffffe32, 0x20004004, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback}, 0x1c) unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffc5) syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0) ioctl$FS_IOC_GETFSLABEL(r5, 0x81009431, &(0x7f0000000240)) socket$inet6_tcp(0xa, 0x1, 0x0) 23:18:03 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8912, &(0x7f0000000180)={0x0, r1}) 23:18:03 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x400454d9, &(0x7f0000000180)={0x0, r1}) 23:18:03 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = syz_open_dev$adsp(&(0x7f00000002c0)='/dev/adsp#\x00', 0x20, 0x8c6e523637012092) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000300)={{0xa, 0x4e24, 0x20, @local, 0x8001}, {0xa, 0x4e22, 0x4f58, @rand_addr="3cba2066f41e710f1e1d7d4f0f4bbb86", 0x1f}, 0x0, [0x80000001, 0x8, 0x0, 0x1, 0x4, 0x2, 0xfffffffffffffff8, 0x53]}, 0x5c) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) setsockopt$IPT_SO_SET_ADD_COUNTERS(r2, 0x0, 0x41, &(0x7f0000000080)=ANY=[@ANYBLOB="6d616e676c6500000000000000000000000000000000000000000000000000000200000000000000000000000000bc1c9c12000000000000000000000000000000000000000000007b72f14b83a75b39643ce80904a054b64fef5e55df16ba8f9cc1c1f8ad0b20047a4417de489dd74ba76ebc8ef5fc6c1b9552bb384fadf9930d34917d52ee36027ae833609c"], 0x1) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:03 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:03 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8922, &(0x7f0000000180)={0x0, r1}) [ 238.205789][T14179] IPVS: ftp: loaded support on port[0] = 21 23:18:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000}}, 0x30) 23:18:04 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x40045731, &(0x7f0000000180)={0x0, r1}) 23:18:04 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = openat$dlm_control(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r1) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:04 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getpgid(0x0) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:04 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8933, &(0x7f0000000180)={0x0, r1}) 23:18:04 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x40049409, &(0x7f0000000180)={0x0, r1}) 23:18:05 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}, @volatile={0xc, 0x0, 0x0, 0x9, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0xd866}}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000140)=""/137, 0x4c, 0x89}, 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x5, 0x9}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, 0x4) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) fsetxattr$system_posix_acl(r0, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000400)={{}, {0x1, 0x1}, [], {0x4, 0x6}, [{0x8, 0x4, r2}, {0x8, 0x3, r3}], {0x10, 0x3}, {0x20, 0x3}}, 0x34, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x13, 0x0, 0x0) 23:18:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffffffc, 0x40) write$tun(r1, &(0x7f0000000040)={@void, @void, @ipv4={{0x32, 0x4, 0x4, 0x7ff, 0x135, 0x64, 0x4dc1ed46, 0x4, 0x5e, 0x0, @multicast2, @remote, {[@end, @timestamp={0x44, 0x38, 0x7, 0x3, 0x5, [{[@multicast2], 0xb7}, {[], 0x4}, {[], 0x5}, {[], 0x9}, {[], 0x10000}, {[@empty], 0x451}, {[@dev={0xac, 0x14, 0x14, 0x27}], 0x9}, {[@initdev={0xac, 0x1e, 0x0, 0x0}], 0x8}, {[], 0x1}]}, @noop, @ssrr={0x89, 0x7, 0x6, [@initdev={0xac, 0x1e, 0x1, 0x0}]}, @noop, @lsrr={0x83, 0x2b, 0x0, [@empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x1f}, @local, @multicast1, @rand_addr=0xfffffffffffffbff, @loopback, @local, @local, @loopback]}, @timestamp={0x44, 0x24, 0x3, 0x3, 0xd5, [{[@empty], 0x2307}, {[@broadcast], 0x2286}, {[@broadcast], 0x1000}, {[], 0x8}, {[], 0x8}]}, @lsrr={0x83, 0x3, 0x1}, @lsrr={0x83, 0x7, 0x3db, [@multicast2]}, @ssrr={0x89, 0x17, 0x9, [@empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}, @rand_addr=0x4, @broadcast]}]}}, @dccp={{0x4e21, 0x4e21, 0x4, 0x1, 0x5, 0x0, 0x0, 0x9, 0x100000001, "e2a1e8", 0x3f, "f01746"}, "647a456aa9b68b2168fbf436fd4628d1e700ef569715799ca3958f23f025434f347ecdf1de674eebe55ef395f2a860746ffa21c8bbc8bae94f358fd5f8e76ff37243398d25b7ec8cb00e132c532014718d3da77e5a64c1e3bda3ecf6b5"}}}, 0x135) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:05 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:05 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae01, &(0x7f0000000180)={0x0, r1}) 23:18:05 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4004af07, &(0x7f0000000180)={0x0, r1}) 23:18:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000}}, 0x30) 23:18:05 executing program 4: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@ptr={0x1, 0x0, 0x0, 0x2, 0x4}, @volatile={0xc, 0x0, 0x0, 0x9, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x3, 0xd866}}]}, {0x0, [0x30, 0x61]}}, &(0x7f0000000140)=""/137, 0x4c, 0x89}, 0x20) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000000)=@sack_info={0x0, 0x5, 0x9}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000080)=@assoc_id=r1, 0x4) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) fsetxattr$system_posix_acl(r0, &(0x7f0000000240)='system.posix_acl_access\x00', &(0x7f0000000400)={{}, {0x1, 0x1}, [], {0x4, 0x6}, [{0x8, 0x4, r2}, {0x8, 0x3, r3}], {0x10, 0x3}, {0x20, 0x3}}, 0x34, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x13, 0x0, 0x0) 23:18:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = syz_open_dev$cec(&(0x7f0000000200)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f0000000140)={0x7f}, 0x1) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x3, 0x4000) getsockopt$packet_buf(r3, 0x107, 0x23, &(0x7f0000000040)=""/97, &(0x7f00000001c0)=0x5a) 23:18:05 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x40085618, &(0x7f0000000180)={0x0, r1}) 23:18:05 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae41, &(0x7f0000000180)={0x0, r1}) 23:18:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ptype\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000000), 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x164, r1, 0x22, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xa0, 0x1, [@TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth0_to_bridge\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9, @mcast1, 0x1}}, {0x14, 0x2, @in={0x2, 0x4e22, @empty}}}}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x41}, 0x4000000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f00000003c0)) sendfile(r2, r0, 0x0, 0x100a14d4) r3 = syz_open_dev$media(&(0x7f0000000340)='/dev/media#\x00', 0x40, 0x2000) ioctl$TIOCSLCKTRMIOS(r3, 0x5457, &(0x7f0000000380)) socket$alg(0x26, 0x5, 0x0) 23:18:05 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x408180, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x124, r2, 0x200, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1d9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0xc4, 0x5, [@TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x800}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9ab}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc2c}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb9db0}]}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4a6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x34}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000140)) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:05 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008ae6a, &(0x7f0000000180)={0x0, r1}) 23:18:05 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae80, &(0x7f0000000180)={0x0, r1}) 23:18:05 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:06 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae41, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:06 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae9a, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 3 (fault-call:4 fault-nth:0): mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:06 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000004140)='./file0\x00', 0x220000, 0x80) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000041c0)={0x0, 0x0}, &(0x7f0000004200)=0xc) getresgid(&(0x7f0000004240), &(0x7f0000004280)=0x0, &(0x7f00000042c0)) fchownat(r0, &(0x7f0000004180)='./file0\x00', r1, r2, 0x1c00) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) recvmmsg(r3, &(0x7f0000003f00)=[{{&(0x7f0000000000)=@isdn, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/43, 0x2b}, {&(0x7f00000002c0)=""/201, 0xc9}], 0x2, &(0x7f00000003c0)=""/174, 0xae}, 0x3}, {{&(0x7f0000000100)=@nfc_llcp, 0x80, &(0x7f0000000700)=[{&(0x7f0000000540)=""/193, 0xc1}, {&(0x7f00000001c0)=""/5, 0x5}, {&(0x7f0000001580)=""/4096, 0x1000}, {&(0x7f0000000640)=""/148, 0x94}, {&(0x7f0000000480)=""/127, 0x7f}], 0x5, &(0x7f0000000780)=""/177, 0xb1}, 0x40}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000200)=""/8, 0x8}, {&(0x7f0000000840)=""/160, 0xa0}, {&(0x7f0000000900)=""/114, 0x72}], 0x3, &(0x7f00000009c0)=""/230, 0xe6}, 0x6}, {{&(0x7f0000000ac0)=@pptp, 0x80, &(0x7f0000001040)=[{&(0x7f0000000b40)=""/251, 0xfb}, {&(0x7f0000000c40)=""/177, 0xb1}, {&(0x7f0000000d00)=""/43, 0x2b}, {&(0x7f0000000d40)=""/197, 0xc5}, {&(0x7f0000000e40)=""/215, 0xd7}, {&(0x7f0000002580)=""/4096, 0x1000}, {&(0x7f0000000f40)=""/19, 0x13}, {&(0x7f0000000f80)=""/188, 0xbc}], 0x8, &(0x7f00000010c0)=""/177, 0xb1}, 0x8}, {{&(0x7f0000001180)=@caif=@util, 0x80, &(0x7f0000001340)=[{&(0x7f0000001200)=""/172, 0xac}, {&(0x7f00000012c0)=""/120, 0x78}], 0x2, &(0x7f0000001380)=""/176, 0xb0}, 0x6}, {{&(0x7f0000001440)=@in={0x2, 0x0, @local}, 0x80, &(0x7f00000014c0)=[{&(0x7f0000003580)=""/205, 0xcd}], 0x1, &(0x7f0000003680)=""/120, 0x78}, 0x1d4}, {{&(0x7f0000003700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x80, &(0x7f0000003b40)=[{&(0x7f0000001500)=""/39, 0x27}, {&(0x7f0000003780)=""/148, 0x94}, {&(0x7f0000003840)=""/200, 0xc8}, {&(0x7f0000003940)=""/52, 0x34}, {&(0x7f0000003980)=""/145, 0x91}, {&(0x7f0000003a40)=""/239, 0xef}], 0x6, &(0x7f0000003bc0)=""/204, 0xcc}, 0xfffffffffffffffe}, {{&(0x7f0000003cc0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x80, &(0x7f0000003dc0)=[{&(0x7f0000003d40)=""/10, 0xa}, {&(0x7f0000003d80)=""/25, 0x19}], 0x2, &(0x7f0000003e00)=""/223, 0xdf}, 0xfffffffffffffff9}], 0x8, 0x40000000, &(0x7f0000004100)={0x77359400}) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = accept4$alg(r3, 0x0, 0x0, 0xfffffffffffffffe) readv(r4, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) fadvise64(r4, 0x0, 0x9f1, 0x1) accept4$alg(r3, 0x0, 0x0, 0x80000) r5 = syz_open_dev$sndpcmp(&(0x7f0000004300)='/dev/snd/pcmC#D#p\x00', 0xe49, 0x2) getsockopt$bt_rfcomm_RFCOMM_LM(r5, 0x12, 0x3, &(0x7f0000004340), &(0x7f0000004380)=0x4) 23:18:06 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xae41, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af03, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xaf01, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) socket$xdp(0x2c, 0x3, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x418000, 0x82) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000140)={0x0, 0x1000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f00000003c0)={r2, 0x1c, &(0x7f0000000200)=[@in6={0xa, 0x4e23, 0x1589, @loopback, 0x4}]}, &(0x7f0000000400)=0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r3 = dup(r0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r3, 0x0, 0x56, 0xfffffeed, &(0x7f0000000000)="2e25bc82a8cef96af05b2e1fc79765bb70ac156323ddc6661a18add89863593472a6b672a334ac4cd0245945c4d25f923001696eeb3e22041a179307279eee1232c1105279a750c60cc955db5f9f2f5e88b4e61fbbc4467e385182afa7f7bf102191a5a9d0cf0e7f95b83a690db3b62034e3574a33169b8846d3701ade1b5b1a2035", &(0x7f00000002c0)=""/220, 0x8}, 0x1c) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000480)=0x1) ioctl$SG_SET_KEEP_ORPHAN(r3, 0x2287, &(0x7f00000004c0)=0x4) r4 = accept4$alg(r3, 0x0, 0x0, 0x3) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000440)={0x8}) readv(r4, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x3, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x0, 0x0, 0xf}}, &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f00000002c0)=""/251, 0xfffffffffffffffc, 0xfffffffffffffffe, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) 23:18:06 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xaf02, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af04, &(0x7f0000000180)={0x0, r1}) 23:18:06 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(0x0) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:06 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='rdma.current\x00', 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000100)={0x20, 0x0, 0x5, {0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffffd}}, 0x20) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x7) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0xc00, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000040)=0x3002) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000140)={0x9, 0x5}) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:06 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af03, &(0x7f0000000180)={0x0, r1}) 23:18:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:07 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af0a, &(0x7f0000000180)={0x0, r1}) 23:18:07 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x400454ca, &(0x7f0000000180)={0x0, r1}) 23:18:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ff5000/0xb000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000e00000/0x200000)=nil, &(0x7f0000f29000/0x1000)=nil, &(0x7f0000eb7000/0x3000)=nil, &(0x7f0000ef7000/0x1000)=nil, &(0x7f0000000040)="955e84a401f9af9d1efa34d30ff216f890203677ef60311c41f01ad24a31a099d54417", 0x23, r1}, 0x68) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x80, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) write$P9_RRENAMEAT(r2, &(0x7f0000000100)={0x7, 0x4b, 0x2}, 0x7) 23:18:07 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af03, &(0x7f0000000180)={0x0, r1}) 23:18:07 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(0x0) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000040)={0xffff, 0x587, 0xfffffffffffffff9, 0x1000, 0x1, 0x8}) 23:18:07 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x40049409, &(0x7f0000000180)={0x0, r1}) 23:18:07 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af03, &(0x7f0000000180)={0x0, r1}) 23:18:07 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af16, &(0x7f0000000180)={0x0, r1}) 23:18:07 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x800) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = gettid() ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000000)=r2) 23:18:07 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4004ae8b, &(0x7f0000000180)={0x0, r1}) 23:18:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0xf, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:08 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)={0x0, r1}) 23:18:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(0x0) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:08 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af16, &(0x7f0000000180)={0x0, r1}) 23:18:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000040)=""/165) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readahead(r2, 0xa1, 0x5) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:08 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4004ae99, &(0x7f0000000180)={0x0, r1}) 23:18:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = dup2(r0, r0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f00000002c0)={@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x0, 0x3, 0x4, {0xa, 0x4e24, 0x9, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xd}}, 0xfff}}}, {&(0x7f0000000080)=""/63, 0x3f}, &(0x7f00000000c0), 0x12}, 0xa0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000a40)="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", 0x1ea) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x101000) iopl(0x8000) ioctl$sock_bt_cmtp_CMTPCONNADD(r2, 0x400443c8, &(0x7f0000000040)={r0, 0x2}) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) seccomp(0x1, 0x1, &(0x7f0000000140)={0x4, &(0x7f0000000100)=[{0x1, 0x1, 0x2, 0xd1}, {0xaf, 0x1ff, 0x5167, 0xfff}, {0x3198, 0x0, 0x4, 0x3f}, {0x3, 0x3, 0x3, 0xab}]}) 23:18:08 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af2f, &(0x7f0000000180)={0x0, r1}) 23:18:08 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4004af07, &(0x7f0000000180)={0x0, r1}) 23:18:08 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)={0x0, r1}) 23:18:08 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:08 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000004c0)='net/hci\x00') getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f0000000540)={'mangle\x00', 0x5e, "ed4e495b75bedeedaac57f0abbe6861dcc7f7b8e85a4abdc7121a7467c2ac029a5be6533d3592ebaf66c8a497c1219acf748c2a6e6d05ad7a04ffccf500e00b6bb05ff980067adefb93654cbb03d248017afffdb51ec8b1ad33dda8e0da5"}, &(0x7f0000000600)=0x82) 23:18:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x20000130, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:09 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) 23:18:09 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)={0x0, r1}) 23:18:09 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008ae90, &(0x7f0000000180)={0x0, r1}) 23:18:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'gcm_base(ctr(aes-aesni),ghash-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:09 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) open(&(0x7f0000000000)='./file0\x00', 0x0, 0xa) 23:18:09 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)={0x0, r1}) 23:18:09 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)={0x0, r1}) 23:18:09 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4020940d, &(0x7f0000000180)={0x0, r1}) 23:18:09 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:09 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000080)=""/191, 0xbf}, {&(0x7f00000002c0)=""/157, 0x9d}, {&(0x7f0000000140)=""/20, 0x14}, {&(0x7f00000001c0)=""/13, 0xd}, {&(0x7f0000000380)=""/173, 0xad}, {&(0x7f0000000440)=""/170, 0xaa}], 0x6, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x490080, 0x0) ioctl$KVM_GET_MSRS(r2, 0xc008ae88, &(0x7f0000000040)={0x2, 0x0, [{}, {}]}) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x2, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)) 23:18:10 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af03, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x82, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r3, 0x800, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x2}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:10 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:10 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x800454d2, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$kcm(0x2b, 0x2000000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000240)="39000000130009006900000000000000ab0080482600000046000107000000141900010010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) io_setup(0xb9, &(0x7f0000000040)=0x0) r4 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x2, 0x2) io_cancel(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xf, 0x4, r0, &(0x7f0000000080)="44b1418c4cb1ea2c3064f6da48ce7a0269185cca3b34acf654976bed607e4046429e010d7ac0ad4c8d34d0f0147153507978a1b9a44fa4e3feb0964fca73", 0x3e, 0x4, 0x0, 0x2, r4}, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x13}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={r5, 0x3, 0x9}, &(0x7f0000000300)=0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r6 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r6, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)) 23:18:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af04, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)) 23:18:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x3, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af0a, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x80045643, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:10 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af25, &(0x7f0000000180)) 23:18:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x640, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0x1, 0x6, 0x3, 0x7, 0x8, 0x7, 0x3, 0x1, 0x9, 0x9, 0x7f, 0x80000000, 0x8001, 0x7]}, &(0x7f0000000140)=0x100) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x9, 0x43506911, 0x200, 0x9, 0x4, 0x40, 0x80000001, 0x10000, r2}, 0x20) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:10 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x80047441, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af25, &(0x7f0000000180)) 23:18:10 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af16, &(0x7f0000000180)={0x0, r1}) 23:18:10 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x80000) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:11 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:11 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af25, &(0x7f0000000180)) 23:18:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x4, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="fdd516e9d6d6eecdfe362174643c02fece8ba0fc00bdffdd748a350ba395047d89f192d1bd5f0e41c4c248937bafa7bf237e3bcdf8401750855e13b650f33bd44bb50543e73fd688b611fea351bd103f8640ec80a1b3516fb1db00640f592859e4b97e14d8c34e6038149d8b74796c04e20fd1888adb01b012b235f5426dd0e32a525055ad794ba7a0a4c18dfee410672e138a1f9116ff169b271f58e20977224486a5", 0xa3) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:11 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x80047453, &(0x7f0000000180)={0x0, r1}) 23:18:11 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)={0x0, r1}) 23:18:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)) 23:18:11 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)) 23:18:11 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008563f, &(0x7f0000000180)={0x0, r1}) 23:18:11 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'\x00\x00\x00\x00\x00\x00\x00\t\xf2\x00', 0x200}) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:11 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af2f, &(0x7f0000000180)={0x0, r1}) 23:18:11 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, &(0x7f0000000180)) 23:18:11 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x6, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:12 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x80086301, &(0x7f0000000180)={0x0, r1}) 23:18:12 executing program 5: syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x7, 0x2803) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:12 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af30, &(0x7f0000000180)={0x0, r1}) 23:18:12 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af25, &(0x7f0000000180)) 23:18:12 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:12 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af25, &(0x7f0000000180)) 23:18:12 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x7, 0x220400) modify_ldt$read_default(0x2, &(0x7f00000000c0)=""/179, 0xb3) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000080)=0x4) 23:18:12 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af00, &(0x7f0000000180)={0x0, r1}) 23:18:12 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4020940d, &(0x7f0000000180)={0x0, r1}) 23:18:12 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af25, &(0x7f0000000180)) 23:18:12 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) execve(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=[&(0x7f00000000c0)='/dev/cachefiles\x00', &(0x7f0000000100)='ctr(aes-aesni)\x00', &(0x7f0000000140)='ctr(aes-aesni)\x00', &(0x7f00000001c0)='ctr(aes-aesni)\x00', &(0x7f0000000200)='/dev/cachefiles\x00'], &(0x7f0000000340)=[&(0x7f0000000300)='bdev\x00']) 23:18:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x1000000, 0x1}}, 0x30) 23:18:13 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:13 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)={0x0, r1}) 23:18:13 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, 0x0) 23:18:13 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4020ae46, &(0x7f0000000180)={0x0, r1}) 23:18:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x25}}, 0x10) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000040)) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x28, r2, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x10c}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x4) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000300)='lp\x00', 0x3) 23:18:13 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, 0x0) 23:18:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:13 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8250aea6, &(0x7f0000000180)={0x0, r1}) 23:18:13 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028700f, &(0x7f0000000180)={0x0, r1}) 23:18:13 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af25, 0x0) 23:18:13 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x202000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x7, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) r4 = syz_open_dev$audion(&(0x7f0000000100)='/dev/audio#\x00', 0x5, 0x20000) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r5, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) r6 = accept(r5, 0x0, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x1) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) write$binfmt_script(r6, &(0x7f0000000480)=ANY=[], 0xfffffe69) recvmsg$kcm(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000240)=""/92, 0x185}, {&(0x7f00000001c0)=""/108, 0x2000022c}], 0x2}, 0x0) mknodat(r4, &(0x7f00000002c0)='./file0\x00', 0x8500, 0x8) write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000040), r3, r4}}, 0x18) 23:18:14 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x2000000, 0x1}}, 0x30) 23:18:14 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:14 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0045878, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4090ae82, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0045878, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:14 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4138ae84, &(0x7f0000000180)={0x0, r1}) 23:18:14 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x101200, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f00000002c0)=ANY=[@ANYBLOB="2b000000efaeb5f1df630600d7b7000000000000000000000040000006000000e96153ba000002000000000000002f7d009931959e181886a733081d1c1996419a884b93ffae142d34174cbda594ac59d254164f2b519020e59c293b55cf4186e663865dd3a1e679d4c3a2026eabd5deab81ea340ab0f3f9d71e510cc4fe47d1dee4b7fd6a8cf8c84401b7603a7a0b872375df2ee0c01a3ae7"], 0x2b) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r2, 0x40505331, &(0x7f0000000040)={{0x6, 0x1}, {0x7ff, 0x1}, 0x196, 0x4, 0xcf8e}) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x3000000, 0x1}}, 0x30) 23:18:15 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc004743e, &(0x7f0000000180)={0x0, r1}) 23:18:15 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)) 23:18:15 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x800454d2, &(0x7f0000000180)={0x0, r1}) 23:18:15 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:15 executing program 5: bind$alg(0xffffffffffffffff, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x800) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0xd4427ba49b59ca04, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000300)={{0xff, @rand_addr=0x3, 0x4e23, 0x0, 'sh\x00', 0x0, 0x10000, 0x10}, {@multicast1, 0x4e24, 0x2, 0x8, 0x2, 0x9}}, 0x44) accept4$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000002c0)=0x1c, 0x80000) readv(r0, &(0x7f0000001540), 0x0) socket$netlink(0x10, 0x3, 0x14) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x2, 0x0, 0x10000, 0xffffffffffffff53}) ioctl$DRM_IOCTL_SG_ALLOC(r2, 0xc0106438, &(0x7f0000000140)={0x80000001, r3}) read$alg(r0, &(0x7f0000000000)=""/130, 0x82) [ 249.379710][T16724] QAT: Invalid ioctl [ 249.419264][T16724] QAT: Invalid ioctl 23:18:15 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0184908, &(0x7f0000000180)={0x0, r1}) 23:18:15 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)) 23:18:15 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000006c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_hmac_sha384\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_NEXT_DEVICE(r1, 0xc0045520, &(0x7f0000000040)=0x8) r2 = msgget$private(0x0, 0x40) msgctl$IPC_RMID(r2, 0x0) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e22, 0x5, @dev={0xfe, 0x80, [], 0xc}, 0xffffffffffffffe0}}}, &(0x7f0000000380)=0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f00000003c0)={r4, 0x3}, 0x8) accept4$alg(r0, 0x0, 0x0, 0x80800) perf_event_open(&(0x7f00000002c0)={0x7, 0x70, 0x40, 0x3, 0x4f8a, 0x8001, 0x0, 0xff, 0x8080, 0x7, 0x7, 0x4f0, 0x7fffffff, 0xffffffff, 0x7fffffff, 0xc, 0x5, 0x1, 0x1, 0x9, 0x658, 0x8, 0xac, 0x2, 0x8000, 0x5, 0x1, 0x849, 0x3ff, 0x0, 0x51, 0x1f, 0x3, 0x81, 0x100, 0xf, 0x9, 0x8, 0x0, 0x4, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x10000, 0xffff, 0x2, 0x7, 0x6, 0x5, 0x3}, 0xffffffffffffffff, 0xa, r3, 0x8) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r5 = getpgrp(0xffffffffffffffff) move_pages(r5, 0x5, &(0x7f0000000140)=[&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil], &(0x7f0000000200)=[0x7, 0x9, 0x100000000000, 0x4, 0x2, 0x4, 0x6, 0x100000001, 0x1, 0x401], &(0x7f0000000340)=[0x0, 0x0], 0x2) sendto$unix(r1, &(0x7f0000000540)="73644108c2d9dc024b187ce9f8d65703384128534ba40968dd1c99ba4507796e9b924b1017037df5754e3c3f24054bf6fdd74dc0aa06253f738ede7ff1ee483b9e712d1df7d88453b43090565ed76baa85919d593fe01670acd4c6f0130811f987b65f8d1adf98715f796d810c02df2a44a1425c67302c599017340d74e57d7c3662329a00cf657caa3aa1cccaee9bebfaaf26fc90f26be56b7d8c1abda0297b91ff4c92ce57d42b96b532b60dd1cb572b7d683108d89172d505a6903d5e5f4d223e0ef3d6", 0xc5, 0x4000080, 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r1, 0x4, &(0x7f0000000400)='vmnet0$trusted\x00', &(0x7f0000000440)='./file0\x00', r1) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) 23:18:15 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x80086301, &(0x7f0000000180)={0x0, r1}) 23:18:15 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0189436, &(0x7f0000000180)={0x0, r1}) 23:18:15 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x4000000, 0x1}}, 0x30) 23:18:16 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x80087601, &(0x7f0000000180)={0x0, r1}) 23:18:16 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x8008af26, &(0x7f0000000180)) 23:18:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x7c, r2, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf64}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1000}]}, @TIPC_NLA_MON={0x4}]}, 0x7c}, 0x1, 0x0, 0x0, 0x81}, 0x1) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:16 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0206434, &(0x7f0000000180)={0x0, r1}) 23:18:16 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f0000000040)={0xf, 0x103, 0x1, {0x9, 0x2, 0x4, 0x6}}) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:16 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x8008af26, &(0x7f0000000180)) 23:18:16 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af00, &(0x7f0000000180)={0x0, r1}) 23:18:16 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc020660b, &(0x7f0000000180)={0x0, r1}) 23:18:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f00000001c0)=0x254b89ab, 0x1) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r2 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000001a40)={@dev, 0x0}, &(0x7f0000001a80)=0x14) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000001ac0)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000000)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = accept4$alg(r0, 0x0, 0x0, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x48, r5, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x66}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x40010}, 0x11) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000080)={{0x2, 0x4e23, @broadcast}, {0x0, @local}, 0x18, {0x2, 0x4e24, @rand_addr=0x8}, 'ipddp0\x00'}) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0x58) readv(r4, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:16 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x8008af26, &(0x7f0000000180)) 23:18:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x6000000, 0x1}}, 0x30) 23:18:16 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) getuid() fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) r1 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r1) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:16 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0285628, &(0x7f0000000180)={0x0, r1}) 23:18:16 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)={0x0, r1}) 23:18:16 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)) 23:18:16 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x9a9f, 0x2000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xb4, r2, 0x200, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x89}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x820b}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}]}, @TIPC_NLA_BEARER={0x18, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}]}]}, 0xb4}, 0x1, 0x0, 0x0, 0x11}, 0x40) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)) 23:18:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="71e67a15cdf0311cfcf33a52a7d86bd1", 0xfffffffffffffe75) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:17 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x80404508, &(0x7f0000000180)={0x0, r1}) 23:18:17 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0305616, &(0x7f0000000180)={0x0, r1}) 23:18:17 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, &(0x7f0000000180)) 23:18:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x40, 0x0) setsockopt$TIPC_MCAST_REPLICAST(r1, 0x10f, 0x86) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x400000, 0x0) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000040)) 23:18:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x223}}, 0x30) 23:18:17 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0505510, &(0x7f0000000180)={0x0, r1}) 23:18:17 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8138ae83, &(0x7f0000000180)={0x0, r1}) 23:18:17 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) getuid() fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) r1 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r1) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:17 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x8008af26, &(0x7f0000000180)) 23:18:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) accept4$alg(r0, 0x0, 0x0, 0x80000) 23:18:17 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:18 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x8008af26, &(0x7f0000000180)) 23:18:18 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0d05605, &(0x7f0000000180)={0x0, r1}) 23:18:18 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8250aea6, &(0x7f0000000180)={0x0, r1}) 23:18:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x80800) setsockopt$RXRPC_SECURITY_KEY(r1, 0x110, 0x1, &(0x7f0000000040)='skcipher\x00', 0x9) r2 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x3, 0x101000) ioctl$RTC_AIE_OFF(r2, 0x7002) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:18 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x8008af26, &(0x7f0000000180)) 23:18:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x300}}, 0x30) 23:18:18 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) getuid() fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000200)) r1 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r1) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r3, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:18 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0045878, &(0x7f0000000180)={0x0, r1}) 23:18:18 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0d05640, &(0x7f0000000180)={0x0, r1}) 23:18:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) fcntl$getflags(r0, 0x40b) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x140, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000040)={0x1, 0x4, 0x9}) 23:18:18 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, 0x0) 23:18:18 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) ioprio_set$pid(0x1, r1, 0x4) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:18 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, 0x0) 23:18:19 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0045878, &(0x7f0000000180)={0x0, r1}) 23:18:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x2, r1}) 23:18:19 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x8008af26, 0x0) 23:18:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0xf) 23:18:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x1, 0x0) getsockopt$inet_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000040)=""/30, &(0x7f0000000080)=0x1e) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:19 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc004743e, &(0x7f0000000180)={0x0, r1}) 23:18:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x3, r1}) 23:18:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)={0x0, r1}) 23:18:19 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:19 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) prctl$PR_CAPBSET_DROP(0x18, 0xd) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f00000002c0)={0x0, 0xd8, "2b4a6828e7387454db78897a606361ced2e73d6c6aade18a506d534be1569aff0fd4013f7cce73ecec78f80746c274774b8de400205038eb577791e86e8c15edcfb95b68fccf991ef39171d452983d676a2e4bc7d80b7e7deaf3c2a6fdd8f1c7e656e920dd00e40f09f24f33bd877e6672e8efe874d31e0c2980c55f66edbfd1c429affa7fc35cd7dd58330f7b607b07b1bd850a0ea704feb29d6d866b6cb6275b0afde53ac7727880f26c5b4eedfbef1da4ca2740659033e89db801e256915cfbb797bcad3a2ba3846ebdbb710eb3d90a782014b2712495"}, &(0x7f0000000180)=0xe0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r3, 0x3, 0x30}, &(0x7f0000000200)=0xc) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r4, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000100)=0x14) 23:18:19 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc008ae05, &(0x7f0000000180)={0x0, r1}) 23:18:19 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)={0x0, r1}) 23:18:19 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4, r1}) 23:18:20 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0106418, &(0x7f0000000180)={0x0, r1}) 23:18:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) 23:18:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x20000130) 23:18:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)={0x0, r1}) 23:18:20 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:20 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x5, r1}) 23:18:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = accept4(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @dev}}}, &(0x7f00000000c0)=0x80, 0x80800) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x4}, &(0x7f0000000140)=0x8) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f00000002c0)={0x2, &(0x7f0000000200)=[{0x5, 0x7fffffff, 0x2, 0x8}, {0x4, 0x1, 0x9, 0x401}]}, 0x10) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000001c0)=@sack_info={r3, 0x80000001, 0x8}, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r4 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) sendto(r1, &(0x7f0000000540)="4d6241150c13408fffddcc5f4faa99d55ca9fb7c010f7991f067e5d36cbfac923136bf53fa3a4a7e3dd4bf0f03bb042ece1da165e145e76ddd15b6f074d7bfafb1b3dd9f57533cbf71ba60b00c7e03c1dd22d451b2441d1d6c872778d0656cbb12d6a717b4a27d79cf7689843e7dfdbc76204ef02f0ecc9caec0c2754b63bb6a8786f6ff5c9c6267acf51e3e1d7a094ae898b8428ebbfd1ba9b6487d0a4c59", 0x9f, 0x4000800, 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') r6 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm-control\x00', 0x4001, 0x0) ioctl$TIOCOUTQ(r6, 0x5411, &(0x7f0000000480)) sendmsg$TIPC_CMD_GET_LINKS(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1020000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r5, 0x800, 0x70bd27, 0x25dfdbff, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x8000}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x24044040) socket$alg(0x26, 0x5, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000680)={r6, &(0x7f0000000600)="239229a307768285878555e37beca0a7f7a31e456daba0bee13ccbc51590b262ffc593a6e834b1cd6fd123ff7b696f2e3f495d927035bbfaacacf51e51be86d68e44a96162bc954d94ce390b2291b253d9a0aff23f010b2b6596fa6f07835e502f6bcd579d4186bca755a2d58e7c565804b93e", &(0x7f0000001580)=""/4096}, 0x18) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f00000004c0)) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000000)="b69ed7f93fc116b45da481e948dbddfef03a30cd6d97d77abe53693d061f1c3eff7cb9c5a32af27f67ec78c8cbcf41069ea37b6480aa680b", 0x38) 23:18:20 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0189436, &(0x7f0000000180)={0x0, r1}) 23:18:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0x80000000000018) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000040)={'nat\x00'}, &(0x7f00000000c0)=0x54) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) setsockopt$sock_void(r1, 0x1, 0x24, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000000)=[@in={0x2, 0x4e21, @local}, @in6={0xa, 0x4e23, 0x0, @rand_addr="0d60462ea72277d9e887e26142e0ddbe"}], 0x2c) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x0, [], [{0x6, 0x3, 0x1, 0xe800000000000000, 0x90, 0x27a}, {0x7, 0x8000, 0x1, 0x38, 0x2, 0x3ff}], [[], [], [], []]}) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000140)={0x0, 0xd, "08c0a080211ebf8795785b270c"}, &(0x7f00000001c0)=0x15) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000200)={r3, 0x2}, 0x8) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:20 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc020660b, &(0x7f0000000180)={0x0, r1}) 23:18:20 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x6, r1}) 23:18:20 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:20 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x21) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e24, 0x8001, @dev={0xfe, 0x80, [], 0x21}, 0x6}}, 0x1, 0x191, 0x3, 0x7, 0x80}, &(0x7f0000000100)=0x98) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000140)={r2, 0x3, 0x1}, 0x8) write$P9_RMKDIR(r1, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x10, 0x3}}, 0x14) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="ede83674f92c487e653d303030303030013030303030303030303030343030010000000000000069643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$bt_rfcomm(0x1f, 0x0, 0x3) sendto(r1, &(0x7f0000000340)="4849a8491e0a01caa918a040298347c53f17ffe42fe376a627ba5d06c235671908e4591af2bd853e9375c04fa8931360f45a363e71b6ecf0e6e2be5e28b061028b880b4adbc9a51ce8941484f3088519ad7bb4e2cd66193ebc0826767cccdc1d94b1f91128968c1ec7aab3a7cb0f90cb096828a9be9c49b4b95250f13d78e5b3976dee768275e12e4fc3de7eae55edffd8c030d09c18fc47b50b88a0cbbed5561349240fd9e7469b93cfc308c109ad1147a0102294417d842698656056c7606ef51082691962c3c240936660", 0xcc, 0x8051, &(0x7f0000000080)=@ipx={0x4, 0xb61, 0x3cf, "c6145df7a10d", 0x20}, 0x80) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:21 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc040564a, &(0x7f0000000180)={0x0, r1}) 23:18:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x7, r1}) 23:18:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x21) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000140)=0x7) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x1002001) syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000000)={0x3000000000, 0x0, 0x201f, 0x3f, 0x7fff, 0xbc3f, 0x221f213d}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETVNETLE(r3, 0x400454dc, &(0x7f0000000080)=0x1) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') 23:18:21 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:21 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040)={0x401, 0x1, 0x1f, 0x101, 0x9}, 0xc) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:21 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x300, r1}) 23:18:21 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:21 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc040564b, &(0x7f0000000180)={0x0, r1}) 23:18:21 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r2, 0xc040564b, &(0x7f0000000040)={0x4, 0x0, 0x1014, 0x4, 0x20, {0x80000000, 0x80000001}}) 23:18:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) r0 = accept4$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs, &(0x7f0000000140)=0x6e, 0x9e3938d18f8d188d) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685, &(0x7f0000000440)={0x1, 0x20, 0x1000, 0x44, &(0x7f0000000240)="fe17df3b7aeb9bc44ac7c9adf62586ef0834b4fa3a595b8bd10048972018bbff86ffa1222ca1abea922a4d0bc63201c0b9f87889a500d49aca121bb824334315b44edf75", 0xe4, 0x0, &(0x7f0000000340)="cf7660dab3b43ea6f53b96c87b4a82514b78a9b87fdeacdfe70f78f0eb64bcc9adf50be0a93fa66eb888ca87e0938f0d29e9052318cf8207bedebdb083f5085056905cde446b29cc601ab1885a2bfef4995e1d8768dec1e1eb92f7389faceb5aefdd3d664309c8bdef724b5b32cf7364c9b9fe8b68869af2801faa863d3154f11b772bdab2cfad193fa0dc3e4d8c1c5045bcbb824aba14015f055bd577014dd638a58136e755720d9aa6ace58f7b893bda5330828421125e54a7591408b4aea822b48d424262a7934a13594ce1b64746c830a56bd1f05567988281a181428401a4aadb01"}) 23:18:22 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:22 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:22 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x500, r1}) 23:18:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0xc0505510, &(0x7f0000000180)={0x0, r1}) 23:18:22 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x4100, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f00000000c0)={0x2, 0x100, 0x100000001, 0x8000, 0xff, 0x7}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) r3 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x559d, 0x4000) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @dev={0xac, 0x14, 0x14, 0x24}, @multicast2}, 0xc) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x10, r3, 0x0) ioctl$VT_RELDISP(r3, 0x5605) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:22 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) write$P9_RXATTRWALK(r0, &(0x7f00000000c0)={0xf, 0x1f, 0x2, 0x7f}, 0xf) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) write$P9_RCLUNK(r0, &(0x7f0000000140)={0x7, 0x79, 0x1}, 0x7) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:22 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)) 23:18:22 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x600, r1}) 23:18:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x2, r1}) 23:18:22 executing program 1: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r1) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r0}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, 0xffffffffffffffff, 0x4, [], r3, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:22 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)) 23:18:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0xfffffffffffffe05}], 0x1) 23:18:22 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x3, r1}) 23:18:22 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x700, r1}) 23:18:22 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/51, 0x330}], 0x1) 23:18:22 executing program 4: ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)) 23:18:22 executing program 1: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r1) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r0}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, 0xffffffffffffffff, 0x4, [], r3, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="0002726f75ad8407003d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, 0x0, 0xf1) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4000, r1}) 23:18:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000000)={0x0, 0x10001, 0x3013}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000040)) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4, r1}) 23:18:23 executing program 1: ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)) fcntl$getown(0xffffffffffffffff, 0x9) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r2) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r1) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r5, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r0}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xb) writev(r4, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, 0xffffffffffffffff, 0x4, [], r3, 0xffffffffffffffff, 0x5, 0x2}, 0x3c) ioctl$int_in(0xffffffffffffffff, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x80401, 0x0) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) 23:18:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x1000000, r1}) 23:18:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x5, r1}) 23:18:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="747275737465642e76626f786e6574312d76626f786e6574305c766d6e657411991301ae76f5ec0f3000"]) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) write$binfmt_script(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="232105000000696c653020766d6e6574312020736b63697068657200202020747275737469642e0a3337"], 0x2a) socket$rds(0x15, 0x5, 0x0) r1 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x2) ioctl$TIOCEXCL(r1, 0x540c) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="934d1913afb9a95ed968137996683cac439d9eba5e1e7e448a4d7b616413fd0e231616ee7b44282009cfc544c82f19a0235edeb447a1ce8bd2e827bc4c4866adea5bda6ff0d02c5d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1, 0xfffffffffffffffc, 0x3}}, 0x30) 23:18:23 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x2000000, r1}) 23:18:23 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x6, r1}) 23:18:23 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:23 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) ioctl$PERF_EVENT_IOC_RESET(r2, 0x2403, 0x16f) 23:18:23 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x60e1b744ae7e00e2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="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"/305, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0400"]) read$FUSE(r0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x8001, 0x0) 23:18:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x3000000, r1}) 23:18:24 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:24 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x7, r1}) 23:18:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xfff}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}], [{@context={'context', 0x3d, 'user_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'rootmode'}}, {@measure='measure'}]}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x7, 0x101000) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000140)={0x0, @bt={0x5, 0x9, 0x1, 0x2, 0x2, 0x4, 0x7ff, 0x8, 0x9, 0x2c, 0x5, 0x82, 0xcd, 0x0, 0x3, 0x20}}) ioctl$TIOCCBRK(r1, 0x5428) 23:18:24 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha512\x00'}, 0x58) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4000000, r1}) 23:18:24 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:24 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x300, r1}) 23:18:24 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x5000000, r1}) 23:18:24 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x8001, 0x501000) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000100)={0x6c1, 0x8001, 0x80000000}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) ioctl$void(r1, 0xc0045878) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x5000000, 0x6}}, 0x136) 23:18:24 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'xts-twofish-avx\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = dup(r1) openat(r2, &(0x7f0000000000)='./file0\x00', 0x200000, 0x188) readv(r1, &(0x7f0000001540), 0xa78d717f8d381f4) 23:18:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x9, 0x0) ioctl$EVIOCREVOKE(r1, 0x40044591, &(0x7f0000000140)=0x60) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000080)=0x40100) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f0000000340)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000240)={0x0, r3}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f00000002c0)={r4, 0x80000, r5}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:24 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x500, r1}) 23:18:24 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x6000000, r1}) 23:18:24 executing program 1: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:24 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) recvmsg(r0, &(0x7f0000000480)={0x0, 0x152, &(0x7f0000000440)=[{&(0x7f0000000380)=""/25, 0xfffffffffffffffc}, {&(0x7f0000006700)=""/4096, 0x1000}, {&(0x7f0000002580)=""/235, 0xfd23}, {&(0x7f0000002680)=""/4096, 0x1000}], 0x4, &(0x7f0000004700)=""/4096, 0xfffffffffffffedf}, 0x20) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x2000, 0x0) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f0000004680)=[{&(0x7f00000004c0)=""/6, 0x6}, {&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f00000002c0)=""/178, 0xfa}, {&(0x7f0000000540)=""/4096, 0x13da}, {&(0x7f00000001c0)=""/100, 0x64}], 0x5) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) ioctl$CAPI_CLR_FLAGS(r1, 0x80044325, &(0x7f0000000040)) accept4$alg(r0, 0x0, 0x0, 0x0) bind$alg(r0, &(0x7f00000003c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x58) 23:18:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x600, r1}) 23:18:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x7000000, r1}) 23:18:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) 23:18:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x80000) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x700, r1}) 23:18:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)) 23:18:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) mount$fuse(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}}) r2 = socket$kcm(0x29, 0x7, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000040)={'team0\x00', 0x9373}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x40000000, r1}) 23:18:25 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000080)='^)em0selfnodev&].\x00') r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0xa000, 0x0) read$eventfd(r2, &(0x7f0000000040), 0x8) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x3f00, r1}) 23:18:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)) 23:18:25 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) ioctl$PPPIOCATTACH(r1, 0x4004743d, &(0x7f0000000140)) r2 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x65c1, 0x0) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f00000000c0)=0x3d72) r3 = accept4$alg(r2, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') readv(r3, &(0x7f0000001540), 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x10000) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)=0xdf) 23:18:25 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4028af11, &(0x7f0000000180)) 23:18:25 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4000, r1}) 23:18:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0xfdfdffff, r1}) 23:18:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, 0x0) 23:18:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x280820) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x1000000, r1}) 23:18:26 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0xfffffdfd, r1}) 23:18:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x3ced2d0dacdf8a4d) getpeername(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000080)=0x80) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x1, 0x2, 0xa000}, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, 0x0) 23:18:26 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x3) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x3f, 0x400002) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000040)={0x2, 0x53}) 23:18:26 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, 0x0) 23:18:26 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x1000000000000, r1}) 23:18:26 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x2000000, r1}) 23:18:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0xffffffffffffff18) r1 = dup2(r0, r0) getsockname$inet(r1, &(0x7f00000002c0)={0x2, 0x0, @multicast2}, &(0x7f0000000300)=0x10) r2 = fcntl$getown(r0, 0x9) ptrace$peekuser(0x3, r2, 0x2) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r3, 0xc0206416, &(0x7f0000000200)={0x7, 0x387b4929, 0xa0af, 0x3ff, 0x10, 0x5}) r4 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000000)="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") readv(r4, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000340)=ANY=[@ANYBLOB="010100000000000006000000000000000600000000000000", @ANYRES32=r0, @ANYBLOB="000000000500"/28, @ANYRES32=r0, @ANYBLOB="00000000bcf6ffffffffffff973800fa00"/28, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\t\x00'/28, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00@\x00'/28, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\a\x00'/28, @ANYRES32=r1, @ANYBLOB="00000000008000"/28]) 23:18:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="726bff10b15a601240454fcfe88064c34b555703ffe35766daf2a419cfe20723d3ed1b7cf336b03056c79537878e9f043517441ea50160e16dd92c8498899986bc5be9810d57b7deadd18277d6052ab466950d0b823ac18ddf15e6e31d49a45e322103117561320a536eabd83a6e20edff", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, 0x0, 0x106) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:27 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x100000000000000, r1}) 23:18:27 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x3000000, r1}) 23:18:27 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)={0x0, r1}) 23:18:27 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:27 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x10000, 0x0) ioctl$KDADDIO(r1, 0x4b34, 0x10000000000) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x96) ioctl$KDMKTONE(r1, 0x4b30, 0x2) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000040)) 23:18:28 executing program 5: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x80300, 0x0) fallocate(r0, 0x24, 0x4, 0x7f) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r2, 0xae04) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_persist_mode\x00', 0x2, 0x0) accept$alg(r3, 0x0, 0x0) r4 = accept4$alg(r1, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:28 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x200000000000000, r1}) 23:18:28 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)={0x0, r1}) 23:18:28 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4000000, r1}) 23:18:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x2b, 0x4, 0x0, {0x0, 0x2, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx\x00'}, 0xcfb39236f2a1ba94) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x6, 0x4100) ioctl$NBD_CLEAR_QUE(r1, 0xab05) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x100, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f0000000040)) 23:18:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:28 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)={0x0, r1}) 23:18:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x40080, 0x0) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r2, 0x800442d4, &(0x7f0000000040)=0x11) fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$peek(0x1, r3, &(0x7f00000000c0)) 23:18:28 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x5000000, r1}) 23:18:28 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x300000000000000, r1}) 23:18:28 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x5c) 23:18:28 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) 23:18:28 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x6000000, r1}) 23:18:28 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x0) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:28 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x400000000000000, r1}) 23:18:29 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) 23:18:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = request_key(&(0x7f00000000c0)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='skcipher\x00', 0xfffffffffffffffb) request_key(&(0x7f0000000000)='.request_key_auth\x00', &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)='skcipher\x00', r1) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x40800, 0x0) ioctl$DRM_IOCTL_ADD_MAP(r2, 0xc0286415, &(0x7f0000000200)={&(0x7f0000ffc000/0x1000)=nil, 0x100000001, 0x7, 0x10, &(0x7f0000ffc000/0x1000)=nil, 0x2}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540), 0x0) 23:18:29 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x7000000, r1}) 23:18:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x500000000000000, r1}) 23:18:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x188) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000180)={0xed, 0x8, 0x1, 0x3, 0x100000001, 0x800, 0x0, 0x8, 0x0}, &(0x7f0000000240)=0x20) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r1, 0x84, 0x78, &(0x7f0000000280)=r2, 0x4) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x84000, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000140)={0x2, r3, 0x1}) ioctl$UI_DEV_DESTROY(r1, 0x5502) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:29 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af00, &(0x7f0000000180)) 23:18:29 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x3f000000, r1}) 23:18:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x600000000000000, r1}) 23:18:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) readv(0xffffffffffffffff, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:29 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af00, &(0x7f0000000180)) 23:18:29 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x3, 0x2) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f0000000040)={0x100000001, 0x6, 0x6}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:29 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x40000000, r1}) 23:18:29 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x700000000000000, r1}) 23:18:29 executing program 4: ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af00, &(0x7f0000000180)) 23:18:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x0, 0x0) 23:18:30 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0xfdfdffff, r1}) 23:18:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x3, 0x4000) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x10002, 0x0) setsockopt$inet_dccp_int(r3, 0x21, 0xb, &(0x7f00000000c0)=0x71, 0x4) prctl$PR_GET_TIMERSLACK(0x1e) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000040)) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) ioctl$VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000100)={0x20, 0xf, 0x2, "68483b43f9779f4f8f4e28dbf68631eb1bacea6c9c13cbb2a7d32c6b6aa30341", 0x4745504a}) 23:18:30 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) 23:18:30 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4000000000000000, r1}) 23:18:30 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:30 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) 23:18:30 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) ioctl(r0, 0x9, &(0x7f0000000000)="a368d62c4d7e438ec0c76423e71e36e5042a9be737cfa3d4300df7b9fb3636254505246f9b2ad31f6908c7254ea830b4c0aa157e4ce75bda03c43f37e298e27b4adb7e08f5908b46f3b2eb158496a02568b955ffa93b64df291e19a59b2053261429ef16d010376e370ccd602fe53028dd3d") 23:18:30 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0xfffffdfd, r1}) 23:18:30 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0xfdfdffff00000000, r1}) 23:18:30 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) 23:18:30 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xff, 0x400) ioctl$VIDIOC_TRY_EXT_CTRLS(r1, 0xc0205649, &(0x7f0000000180)={0xfb90004, 0x1f, 0x3, [], &(0x7f0000000140)={0x9b0977, 0xf20f, [], @string=&(0x7f00000000c0)=0x7fff}}) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:31 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x208082, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x1000, 0x4) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:31 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x1000000000000, r1}) 23:18:31 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af00, &(0x7f0000000180)) 23:18:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x200001}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r2, 0x400, 0x70bd29, 0x25dfdbfc}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0xc010) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:18:31 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:31 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af00, &(0x7f0000000180)) 23:18:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000080)={0xbac5, 0xfffffffffffffffa, [0x0, 0x2, 0x9, 0x1, 0x2b], 0x7}) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) 23:18:31 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) write$UHID_DESTROY(r1, &(0x7f0000000080), 0x4) 23:18:31 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x100000000000000, r1}) 23:18:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = getpgrp(0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f00000007c0)={0xc, 0x8, 0xfa00, {&(0x7f00000003c0)}}, 0x10) wait4(r1, &(0x7f0000000300), 0x8, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000040)="f1e5dbc51f59000000000000000000007846b51b9746b3439e", 0xfffffffffffffd94) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x88000, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') ioctl$SNDRV_TIMER_IOCTL_STOP(r4, 0x54a1) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x270}}, 0x4) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', r6}, 0x10) readv(r3, &(0x7f0000001540)=[{&(0x7f0000000340)=""/51, 0x33}], 0x1000000000000141) 23:18:31 executing program 4: openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(0xffffffffffffffff, 0x4008af00, &(0x7f0000000180)) 23:18:32 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x4000, 0x0) ioctl$KVM_GET_FPU(r0, 0x81a0ae8c, &(0x7f00000004c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000a40)={{0x2, 0x7}, 'port1\x00', 0x4, 0x30010, 0x3ff, 0x3, 0xffffffff, 0x2, 0xff, 0x0, 0x3, 0x4}) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000b00)=""/140) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c10"]) ioctl$INOTIFY_IOC_SETNEXTWD(r0, 0x40044900, 0x5) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000d00)={r0, 0x0, 0x38, 0x5c, &(0x7f0000000c40)="81c57af9109fbaead9de6a971e976ec24adce71781c031a741d8bcbc09d39f7f279755b5f57f62312a84d433d202a37a35348dd8daf51adc", &(0x7f0000000c80)=""/92}, 0x28) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f00000001c0)={0x0, 0xfffffffffffffff8, 0x30, 0x3f, 0x1f}, &(0x7f0000000200)=0x18) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000bc0)={0x5, 0x0, 0xfffffffffffff800, 0x9, r1}, &(0x7f0000000c00)=0x10) getsockopt$EBT_SO_GET_INIT_INFO(r0, 0x0, 0x82, &(0x7f0000000900)={'filter\x00'}, &(0x7f0000000980)=0x78) sendmsg(r0, &(0x7f00000002c0)={&(0x7f0000000140)=@rxrpc=@in4={0x21, 0x2, 0x2, 0x10, {0x2, 0x4e21, @local}}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000240)="6bd3dceeb6b5e6783995ca28ae3e2289f1cd086161b8603bf8d680811b5ba8fcd117e13368ee30c0a2adcccc25ae93127c39997262f5edee8eb6cfd885f77068bf62a2c0274c3e92b7efc06e7c7b5040db2b1cd8bbc8cab6cf2ebedf7bf47ea6265efcb722527c15d0573343d5a8a5e6084d8df106c2", 0x76}, {&(0x7f0000000340)="07030f9a30af0befa140f41ace5374034871212cc767f3c357228d4e476daa03a12eb7f888a6bd4142ef2564dafbc8ed0d441d739284f95f496f0fa11cc6a25dc2c749fdda42a706dbef99a7576abc91a9b4d72737bc3e113c851d85fbb334604b058b639d569f7b50b6612bd9203e4f8fd1ba2d4eb28fc7e169de7cbb4dd5df1859829411a15636a924d9d2f2b898a283c868d76c7df9badc288d8d224d36ab3dddde3b72a3f8ac8f2555599895368b708eeb28f2e6ab17655704c9f145dfd1", 0xc0}, {&(0x7f0000000400)="2355fe2b5a01be10988497f0b97e1b6bcdca01d62c4af0afc99125823ac229e6445bd5861e5d5704a98818ddb3bd3a0b1c0bb1da3320a4418d7906c99cfde1ed0294a95d7b252c2620fea0a3b71b72156607559a71b16bcf28e9ead2a8eaed0b3a5132e355bebfceee1599a8dcd7da2cc8d4efeed386f94391c851f2e8f09d9df3711a6dc306f9da2e05f8763e926b53e039e6", 0x93}, {&(0x7f00000000c0)="08a271282402fd5c0ee607936c745b6972886b8afdf582a96a61ad8955ff08e459a8dbe66f76a3", 0xa}, {&(0x7f0000000680)="c84fa9d04b71ec79989cdf4d0f49004de01dcfd8e79d2e783319222f42263d534cdb0f9991d7199c668a34be0b8c0bb497178fa97c0e9f862b3f56165598308bd7ae13ea5285e975115aa33758014d39a3a18b6f09ae2cb76e7a4e3eefaffdd2a5e0416daa0839a665af0a5e1705ead72566e4c65327bfb9bc0ac311b4343f5667c40883f215530c30bd3aa97768c9069c95a7269714988e1b0ded2f5a87f3f80cd76f15fd1472921b667ba2c268586a868b920e0e72967b97b8cc68d79bb75621467b164dcf3e1c950edd224a1b337345985822bb51f7ff9c4f67b87d42a10583", 0xe1}, {&(0x7f0000000780)="7d051c2371c49c274b6e7e3aad6f872fcb7df6c0cfd8340197b16063ea53469742f809bd83d7ae5c83e7dba4734d49091aba818e955f3e3c10d793fe2822c4d5b4d636d5cf9ed5b3d8f6fe658a091921d616f49e9719bf940911176f51eeb70afa336fcb5f4b7da5a527535dda8a3edacbbc6365315e30834fb284e14a45f8c1182e88fea92712f1c2b717d43f23d9fb49d296c6c8b2e5b59cf4e3264ac85e9156797c195252404f82431f68484e6f1fe84a1a1dfe759d0c6b52fced5c9ac0012755243112b3fea6ae76f3c0c20ead9c5fedc43b2440", 0xd6}], 0x6, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], 0x4f8}, 0x1) 23:18:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:18:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000000c0)={0xffffffff7fffffff, 0x1, 0x200}) r2 = accept4$alg(r0, 0x0, 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) readv(r2, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000080)=r1) 23:18:32 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x200000000000000, r1}) 23:18:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, 0x0) 23:18:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(aes-aesni)\x00'}, 0x58) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x3, 0x8000) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000000c0)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000140)=0xe54, 0x4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000340)=0x800) sched_getscheduler(r2) r4 = accept4$alg(r0, 0x0, 0x0, 0x0) readv(r4, &(0x7f0000000840)=[{&(0x7f00000003c0)=""/212, 0xd4}, {&(0x7f00000008c0)=""/215, 0xd7}, {&(0x7f0000000640)=""/196, 0xc4}, {&(0x7f0000000740)=""/105, 0x69}, {&(0x7f00000004c0)=""/50, 0x32}], 0x5) rt_sigpending(&(0x7f0000000180), 0x8) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f0000000300)={0x14, 0xa0, &(0x7f0000000240)="484befdc7c06783ab96df438e6ba013425c8f3d1d3e0b3085190b1f7526e0ef85fd9a0a744c0c1294db95bad128dd76172f56c5edc4e9d01045e7bbb4681b83fcba1f63fa9c9a73d57334252e7d2b835695553be47f320886f807eabc71fdb86ef4dc3506e05e2b0cc557285b743186c2b80371662f7a89b5cb36855ae83db4066c51c19879fe3e9fce4c404b55c334ad47772217d1524d2f2831bd7f50b19cc"}) setresuid(r3, r3, r3) fcntl$getown(r1, 0x9) 23:18:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, 0x0) 23:18:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x29, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:18:32 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x300000000000000, r1}) 23:18:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@empty, @local, 0x0}, &(0x7f0000000140)=0xc) recvfrom$packet(r1, &(0x7f00000004c0)=""/4096, 0x1000, 0x103, &(0x7f0000000180)={0x11, 0x1e, r2, 0x1, 0x3f}, 0x14) 23:18:32 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000240)={0x26, 'aead\x00', 0x0, 0x0, 'morus640-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="71e67a15cdf0311cfcf33a52a7d86bd1", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x20) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000500)=""/51, 0x33}], 0x1) fstatfs(r0, &(0x7f0000000080)=""/45) 23:18:32 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x400000000000000, r1}) 23:18:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, 0x0) 23:18:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:18:32 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x500000000000000, r1}) 23:18:32 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) syz_emit_ethernet(0x6e, &(0x7f000010ef70)={@random="cd390b081bf2", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "02290f", 0x38, 0x3a, 0x0, @ipv4, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, [], {0x0, 0x6, "d5cae2", 0x0, 0x29, 0x0, @empty, @mcast2, [], "f601929f106531aa"}}}}}}}, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:18:32 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x1000000000000, r1}) 23:18:32 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:32 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000080)={0x0, 0x4}, &(0x7f00000000c0)=0x8) accept$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000280)=0xfffffffffffffff3) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x10001}, &(0x7f0000000140)=0x8) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80020000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x28, r3, 0x300, 0x70bd26, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz1\x00'}}, ["", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4}, 0x40) 23:18:32 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x2b, 0x4, 0x0, {0x0, 0x2, 0x3, 0x0, [0x0, 0x0, 0x0]}}, 0x2b) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:33 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x600000000000000, r1}) 23:18:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x80, 0x0) ioctl$DRM_IOCTL_GEM_FLINK(r2, 0xc008640a, &(0x7f0000000400)={0x0}) ioctl$DRM_IOCTL_GEM_FLINK(0xffffffffffffffff, 0xc008640a, &(0x7f0000000340)={r3, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000380)={0x0, 0x80000}) ioctl$DRM_IOCTL_GEM_OPEN(r2, 0xc010640b, &(0x7f00000003c0)={r4, r5, 0x40}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000080)={'netdevsim0\x00', {0x2, 0x4e20, @remote}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) sync() ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000280)) clone(0x8253000, &(0x7f00000000c0)="c235efb33cd41d6f5c8a904b66d79c91733ad40b236c62571460015b572ac210fd2d3f9a04f4142f323d2940553ae1345731", &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000240)="6d47fca5a19eb9a0ff8022b9bf027dc9308395a6f05a6edb5785f2d0065fb2f7f4f813df6254305443279141fc") 23:18:33 executing program 5: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4000000, r1}) 23:18:33 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x700000000000000, r1}) 23:18:33 executing program 0: pipe(&(0x7f0000000080)) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) 23:18:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000a80)='trusted.overlay.upper\x00', &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) 23:18:33 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x3f00000000000000, r1}) 23:18:33 executing program 5 (fault-call:1 fault-nth:0): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) 23:18:33 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$FS_IOC_GETVERSION(r0, 0x80087601, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x7, 0x3, [0xfffffffffffffff7, 0x1, 0x5]}, &(0x7f00000001c0)=0xe) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000200)={r2, 0x2}, &(0x7f0000000240)=0x8) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r1}) pwrite64(r0, &(0x7f00000000c0)="565ec9f024dd6ea073d1e4d73d80de523fcf13824547cb3be1785b0ad33eb76492c0455fe5ad85e2df50b541eea9b653c57559d00a3860175bf4b2e154aefc536463219100d8be902c2964ba5101a951acadd7e4211c1630", 0x58, 0x0) 23:18:33 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x4000000000000000, r1}) [ 267.858356][T21209] FAULT_INJECTION: forcing a failure. [ 267.858356][T21209] name failslab, interval 1, probability 0, space 0, times 0 [ 267.940908][T21209] CPU: 0 PID: 21209 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 267.948618][T21209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.958676][T21209] Call Trace: [ 267.962007][T21209] dump_stack+0x172/0x1f0 [ 267.966362][T21209] should_fail.cold+0xa/0x15 [ 267.971020][T21209] ? fault_create_debugfs_attr+0x180/0x180 [ 267.976844][T21209] ? ___might_sleep+0x163/0x280 [ 267.981714][T21209] __should_failslab+0x121/0x190 [ 267.986666][T21209] should_failslab+0x9/0x14 [ 267.991185][T21209] __kmalloc+0x2e0/0x770 [ 267.995462][T21209] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 268.001228][T21209] ? rcu_read_lock_sched_held+0x110/0x130 [ 268.006957][T21209] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 268.012689][T21209] tomoyo_realpath_from_path+0xcd/0x7b0 [ 268.018250][T21209] ? tomoyo_path_number_perm+0x193/0x520 [ 268.023914][T21209] tomoyo_path_number_perm+0x1dd/0x520 [ 268.029382][T21209] ? tomoyo_path_number_perm+0x193/0x520 [ 268.035055][T21209] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 268.040890][T21209] ? __f_unlock_pos+0x19/0x20 [ 268.045616][T21209] ? __fget+0x384/0x560 [ 268.049811][T21209] ? ksys_dup3+0x3e0/0x3e0 [ 268.054267][T21209] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.060525][T21209] ? fput_many+0x12c/0x1a0 [ 268.064986][T21209] tomoyo_file_ioctl+0x23/0x30 [ 268.069754][T21209] security_file_ioctl+0x77/0xc0 [ 268.074689][T21209] ksys_ioctl+0x57/0xd0 [ 268.078870][T21209] __x64_sys_ioctl+0x73/0xb0 [ 268.083479][T21209] do_syscall_64+0xfd/0x6a0 [ 268.088005][T21209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.093897][T21209] RIP: 0033:0x459829 [ 268.097786][T21209] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.117436][T21209] RSP: 002b:00007f02f7baac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.125838][T21209] RAX: ffffffffffffffda RBX: 00007f02f7baac90 RCX: 0000000000459829 [ 268.133819][T21209] RDX: 0000000020000180 RSI: 000000004008af00 RDI: 0000000000000003 23:18:33 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) [ 268.141776][T21209] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.149730][T21209] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02f7bab6d4 [ 268.157682][T21209] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000004 23:18:33 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4028af11, &(0x7f0000000180)) [ 268.184373][T21209] ERROR: Out of memory at tomoyo_realpath_from_path. 23:18:33 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f0000000100)={0x2}) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) ioctl$IMDELTIMER(r1, 0x80044941, &(0x7f00000000c0)) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0x0, r2}) [ 268.410519][T21240] FAULT_INJECTION: forcing a failure. [ 268.410519][T21240] name failslab, interval 1, probability 0, space 0, times 0 [ 268.431268][T21240] CPU: 1 PID: 21240 Comm: syz-executor.4 Not tainted 5.2.0+ #90 [ 268.438926][T21240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.448986][T21240] Call Trace: [ 268.452294][T21240] dump_stack+0x172/0x1f0 [ 268.456656][T21240] should_fail.cold+0xa/0x15 [ 268.456693][T21240] ? fault_create_debugfs_attr+0x180/0x180 [ 268.467082][T21240] ? ___might_sleep+0x163/0x280 [ 268.467131][T21240] __should_failslab+0x121/0x190 [ 268.467151][T21240] should_failslab+0x9/0x14 [ 268.467164][T21240] __kmalloc+0x2e0/0x770 [ 268.467192][T21240] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 268.485698][T21240] ? rcu_read_lock_sched_held+0x110/0x130 [ 268.497269][T21240] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 268.497291][T21240] tomoyo_realpath_from_path+0xcd/0x7b0 [ 268.497310][T21240] ? tomoyo_path_number_perm+0x193/0x520 [ 268.497336][T21240] tomoyo_path_number_perm+0x1dd/0x520 [ 268.508583][T21240] ? tomoyo_path_number_perm+0x193/0x520 [ 268.508606][T21240] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 268.508621][T21240] ? __f_unlock_pos+0x19/0x20 [ 268.508685][T21240] ? __fget+0x384/0x560 [ 268.539965][T21240] ? ksys_dup3+0x3e0/0x3e0 [ 268.544405][T21240] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.550665][T21240] ? fput_many+0x12c/0x1a0 [ 268.555108][T21240] tomoyo_file_ioctl+0x23/0x30 [ 268.559881][T21240] security_file_ioctl+0x77/0xc0 [ 268.564891][T21240] ksys_ioctl+0x57/0xd0 [ 268.569044][T21240] __x64_sys_ioctl+0x73/0xb0 [ 268.573652][T21240] do_syscall_64+0xfd/0x6a0 [ 268.578158][T21240] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.584033][T21240] RIP: 0033:0x459829 [ 268.587922][T21240] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:18:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) r1 = request_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000140)='(:}bdevGPL\x00', 0xfffffffffffffffd) r2 = socket$alg(0x26, 0x5, 0x0) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000280)='ip_vti0\x00') r3 = add_key(&(0x7f0000000180)='big_key\x00', &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r4, 0x29, 0x41, &(0x7f0000000180)={'raw\x00', 0x4, "d8d02a98"}, &(0x7f0000000040)=0x28) keyctl$link(0x8, r1, r3) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) 23:18:34 executing program 5 (fault-call:1 fault-nth:1): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) 23:18:34 executing program 2: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af10, &(0x7f0000000180)={0xfdfdffff00000000, r1}) 23:18:34 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="00fb110107d3f7c938c71552ddfe3badced0701e219c04ab50a466983a262c4ecd25a6df5ab9a7e4e34feb788b0b68bfec72e855992e2f032600e5108ab161cf562828500d00002af808e0d3689dfbd457a8f64f949cafa162aac4dfd3c0409ec6c9f6f54d00000000edf359e0cd5478cf1bd40f2694446478b87863e6f4ee9748f03f383ff8439d89d32003dba4000087fecbd841e3dc29d087b5c19ce9645e6edc832e1c3da54a6d9f6fab8a051086c36fa241da979d9821e4d5c6c0a72bf325f86146a62891c998a10d28f305effcec0be72061a386fdec00003edd0b04a6536473f5e0f055fe0103189bfb8d6079466eaaaa836c807d3bb00b13c068684d18bd92a3bdec9bb1fd11762070e5885d0000000000000000924fcb8780bdc068e23c5654be12e3ba32f9827cb5072965881100f5aeedf9f65757c835d44ef12e49d2f1339fe76024710336265b45deb1dc508befe130df796e73340b6a9666a1773618b21f20ad9fa7bc50ed87ce89030d6217c28f37a17603cb9466483dc38759ec1ea6d63bd4981fe09eaf16b306d2b6aeffe1ac630428950db387d57abd925603a945556272701100316e37d6912eeea4bf5909ddeff9a690883b7bace224a47971cedad3"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) [ 268.607521][T21240] RSP: 002b:00007fb8b6837c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.615925][T21240] RAX: ffffffffffffffda RBX: 00007fb8b6837c90 RCX: 0000000000459829 [ 268.623906][T21240] RDX: 0000000020000180 RSI: 000000004028af11 RDI: 0000000000000003 [ 268.631882][T21240] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.639855][T21240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb8b68386d4 [ 268.647833][T21240] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000004 [ 268.669934][T21240] ERROR: Out of memory at tomoyo_realpath_from_path. [ 268.683842][T21251] FAULT_INJECTION: forcing a failure. [ 268.683842][T21251] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 268.697093][T21251] CPU: 1 PID: 21251 Comm: syz-executor.5 Not tainted 5.2.0+ #90 [ 268.704729][T21251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 268.714802][T21251] Call Trace: [ 268.714835][T21251] dump_stack+0x172/0x1f0 [ 268.714863][T21251] should_fail.cold+0xa/0x15 [ 268.714890][T21251] ? fault_create_debugfs_attr+0x180/0x180 [ 268.714928][T21251] ? lock_downgrade+0x920/0x920 [ 268.714957][T21251] should_fail_alloc_page+0x50/0x60 [ 268.722579][T21251] __alloc_pages_nodemask+0x1a1/0x8f0 [ 268.722597][T21251] ? __kasan_check_read+0x11/0x20 [ 268.722616][T21251] ? mark_lock+0xc0/0x11e0 [ 268.722634][T21251] ? __alloc_pages_slowpath+0x2520/0x2520 [ 268.722648][T21251] ? __kasan_check_read+0x11/0x20 [ 268.722681][T21251] ? fault_create_debugfs_attr+0x180/0x180 [ 268.722703][T21251] cache_grow_begin+0x90/0xd20 [ 268.733077][T21251] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 268.733112][T21251] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 268.733132][T21251] __kmalloc+0x6b2/0x770 [ 268.733151][T21251] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 268.733190][T21251] tomoyo_realpath_from_path+0xcd/0x7b0 [ 268.743225][T21251] ? tomoyo_path_number_perm+0x193/0x520 [ 268.743251][T21251] tomoyo_path_number_perm+0x1dd/0x520 [ 268.743266][T21251] ? tomoyo_path_number_perm+0x193/0x520 [ 268.743287][T21251] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 268.743301][T21251] ? __f_unlock_pos+0x19/0x20 [ 268.743346][T21251] ? __fget+0x384/0x560 [ 268.753718][T21251] ? ksys_dup3+0x3e0/0x3e0 [ 268.753737][T21251] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 268.753754][T21251] ? fput_many+0x12c/0x1a0 [ 268.753789][T21251] tomoyo_file_ioctl+0x23/0x30 [ 268.753808][T21251] security_file_ioctl+0x77/0xc0 [ 268.753827][T21251] ksys_ioctl+0x57/0xd0 [ 268.866853][T21251] __x64_sys_ioctl+0x73/0xb0 [ 268.871447][T21251] do_syscall_64+0xfd/0x6a0 [ 268.875942][T21251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 268.881820][T21251] RIP: 0033:0x459829 [ 268.885718][T21251] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 268.905321][T21251] RSP: 002b:00007f02f7baac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 268.913740][T21251] RAX: ffffffffffffffda RBX: 00007f02f7baac90 RCX: 0000000000459829 [ 268.921701][T21251] RDX: 0000000020000180 RSI: 000000004008af00 RDI: 0000000000000003 [ 268.929656][T21251] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 268.937643][T21251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f02f7bab6d4 [ 268.945620][T21251] R13: 00000000004c4790 R14: 00000000004d8848 R15: 0000000000000004 [ 268.976629][ T3902] BUG: Bad rss-counter state mm:0000000094984544 idx:0 val:7680 [ 268.984369][ T3902] BUG: Bad rss-counter state mm:0000000094984544 idx:1 val:3 [ 268.991858][ T3902] BUG: non-zero pgtables_bytes on freeing mm: 135168 [ 268.999385][T21243] ================================================================== [ 269.007737][T21243] BUG: KASAN: use-after-free in unmap_page_range+0x1e26/0x2170 [ 269.015302][T21243] Read of size 8 at addr ffff88805c3162d0 by task syz-executor.0/21243 [ 269.023542][T21243] [ 269.025886][T21243] CPU: 0 PID: 21243 Comm: syz-executor.0 Not tainted 5.2.0+ #90 [ 269.033514][T21243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.033533][T21243] Call Trace: [ 269.033557][T21243] dump_stack+0x172/0x1f0 [ 269.033576][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.033596][T21243] print_address_description.cold+0xd4/0x306 [ 269.033623][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.033637][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.033653][T21243] __kasan_report.cold+0x1b/0x36 [ 269.033671][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.033687][T21243] kasan_report+0x12/0x17 [ 269.033704][T21243] __asan_report_load8_noabort+0x14/0x20 [ 269.033717][T21243] unmap_page_range+0x1e26/0x2170 [ 269.033750][T21243] ? vm_normal_page_pmd+0x420/0x420 [ 269.051408][T21243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.051423][T21243] ? uprobe_munmap+0xad/0x320 [ 269.051442][T21243] unmap_single_vma+0x19d/0x300 [ 269.051462][T21243] unmap_vmas+0x135/0x280 [ 269.051479][T21243] ? zap_vma_ptes+0x110/0x110 [ 269.051503][T21243] ? __kasan_check_write+0x14/0x20 [ 269.051520][T21243] exit_mmap+0x2ba/0x530 [ 269.051541][T21243] ? __ia32_sys_munmap+0x80/0x80 [ 269.142894][T21243] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.149155][T21243] ? __khugepaged_exit+0xcf/0x410 [ 269.154210][T21243] mmput+0x179/0x4d0 [ 269.158116][T21243] do_exit+0x84e/0x2ea0 [ 269.162298][T21243] ? mm_update_next_owner+0x640/0x640 [ 269.167687][T21243] ? lock_downgrade+0x920/0x920 [ 269.172553][T21243] ? _raw_spin_unlock_irq+0x28/0x90 [ 269.177760][T21243] ? get_signal+0x392/0x2500 [ 269.182358][T21243] ? _raw_spin_unlock_irq+0x28/0x90 [ 269.187574][T21243] do_group_exit+0x135/0x360 [ 269.192396][T21243] get_signal+0x47c/0x2500 [ 269.196827][T21243] ? do_vfs_ioctl+0x120/0x13e0 [ 269.201597][T21243] do_signal+0x87/0x1700 [ 269.205846][T21243] ? __fget+0x384/0x560 [ 269.210012][T21243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.216261][T21243] ? setup_sigcontext+0x7d0/0x7d0 [ 269.221316][T21243] ? kick_process+0xef/0x180 [ 269.226007][T21243] ? exit_to_usermode_loop+0x43/0x380 [ 269.231383][T21243] ? do_syscall_64+0x5a9/0x6a0 [ 269.231398][T21243] ? exit_to_usermode_loop+0x43/0x380 [ 269.231418][T21243] ? lockdep_hardirqs_on+0x418/0x5d0 [ 269.231436][T21243] ? trace_hardirqs_on+0x67/0x240 [ 269.231457][T21243] exit_to_usermode_loop+0x286/0x380 [ 269.231478][T21243] do_syscall_64+0x5a9/0x6a0 [ 269.231497][T21243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.231510][T21243] RIP: 0033:0x459829 [ 269.231530][T21243] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 269.241663][T21243] RSP: 002b:00007f882b03fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 269.299537][T21243] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000459829 [ 269.299547][T21243] RDX: 0000000020000180 RSI: 000000004008af10 RDI: 0000000000000003 [ 269.299555][T21243] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 23:18:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40e00, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000000c0), 0x4) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x30, 0x5, 0x0, {0x5000000, 0x1}}, 0x30) [ 269.299564][T21243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f882b0406d4 [ 269.299573][T21243] R13: 00000000004c4790 R14: 00000000004d8848 R15: 00000000ffffffff [ 269.299597][T21243] [ 269.299605][T21243] Allocated by task 9228: [ 269.299624][T21243] save_stack+0x23/0x90 [ 269.299645][T21243] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 269.315584][T21243] kasan_slab_alloc+0xf/0x20 [ 269.315596][T21243] kmem_cache_alloc+0x121/0x710 [ 269.315611][T21243] dup_mm+0x8a/0x1430 [ 269.315623][T21243] copy_process+0x28b7/0x6b00 [ 269.315642][T21243] _do_fork+0x146/0xfa0 23:18:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="f5554589f6efc7da8b0b2d29c1ffcd32ed1975efb2a5de5b47358fa591ff1684155459e549b8f23608fc54959434d32a4f6ecdd48b0faf43f989379d22ba5243f8ccbddc9bc6ea8d6c6c2098c126b2711008"]) read$FUSE(r0, 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000100)={0x28b, 0x5, 0x0, {0x5000000, 0x1, 0x0, 0xfffffffffffffffe}}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) capset(&(0x7f0000000380)={0x19980330, r1}, &(0x7f0000000340)={0x80000000, 0x4648, 0x7, 0x5, 0x1, 0x10000}) r2 = syz_open_dev$amidi(&(0x7f00000002c0)='/dev/amidi#\x00', 0x3183, 0x80000141000) getsockopt$inet_sctp6_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000440)=@assoc_value={0x0}, &(0x7f0000000500)=0x2bb) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYBLOB="07000600020000000000000000000040"], 0x14) [ 269.331565][T21243] __x64_sys_clone+0x18d/0x250 [ 269.331583][T21243] do_syscall_64+0xfd/0x6a0 [ 269.331598][T21243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.331621][T21243] [ 269.331629][T21243] Freed by task 3902: [ 269.331642][T21243] save_stack+0x23/0x90 [ 269.331654][T21243] __kasan_slab_free+0x102/0x150 [ 269.331664][T21243] kasan_slab_free+0xe/0x10 [ 269.331675][T21243] kmem_cache_free+0x86/0x320 [ 269.331685][T21243] __mmdrop+0x238/0x320 [ 269.331699][T21243] finish_task_switch+0x457/0x720 [ 269.331712][T21243] __schedule+0x75d/0x1580 [ 269.331724][T21243] schedule+0xa8/0x270 [ 269.331738][T21243] schedule_hrtimeout_range_clock+0x1b1/0x380 [ 269.331758][T21243] schedule_hrtimeout_range+0x2b/0x40 [ 269.446983][T21243] ep_poll+0xcca/0xe60 [ 269.451057][T21243] do_epoll_wait+0x210/0x260 [ 269.455662][T21243] __x64_sys_epoll_wait+0x97/0xf0 [ 269.460682][T21243] do_syscall_64+0xfd/0x6a0 [ 269.465198][T21243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.471092][T21243] [ 269.473429][T21243] The buggy address belongs to the object at ffff88805c316280 [ 269.473429][T21243] which belongs to the cache mm_struct(17:syz0) of size 1496 [ 269.488159][T21243] The buggy address is located 80 bytes inside of [ 269.488159][T21243] 1496-byte region [ffff88805c316280, ffff88805c316858) [ 269.501419][T21243] The buggy address belongs to the page: [ 269.507094][T21243] page:ffffea000170c580 refcount:1 mapcount:0 mapping:ffff8880992d1a80 index:0x0 compound_mapcount: 0 [ 269.518026][T21243] flags: 0x1fffc0000010200(slab|head) [ 269.523432][T21243] raw: 01fffc0000010200 ffffea0002a37488 ffffea000180de88 ffff8880992d1a80 [ 269.532040][T21243] raw: 0000000000000000 ffff88805c316280 0000000100000004 0000000000000000 [ 269.540613][T21243] page dumped because: kasan: bad access detected [ 269.547017][T21243] [ 269.549332][T21243] Memory state around the buggy address: [ 269.554965][T21243] ffff88805c316180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 269.563026][T21243] ffff88805c316200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 269.571100][T21243] >ffff88805c316280: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb 23:18:35 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000000806, 0x0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0xd) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x8) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x0, 0x0) getuid() fsetxattr$trusted_overlay_upper(r1, 0x0, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], 0x1, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)) fcntl$getown(r0, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000200)) r2 = fcntl$getown(r0, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000008c0)=0xc) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) getpgid(r3) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001040)={{{@in=@loopback, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000f00)=0xfffffffffffffd81) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000380)=0xc) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000002c0)='anon_inodefs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) getpgid(r2) io_setup(0x4, &(0x7f0000000240)=0x0) io_submit(r6, 0x1, &(0x7f0000000a00)=[&(0x7f00000009c0)={0x0, 0x0, 0x0, 0x0, 0x99d9, 0xffffffffffffffff, &(0x7f00000003c0)="cdc2185b2083", 0x6, 0xfffffffffffff001, 0x0, 0x1, r1}]) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x1) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000900), &(0x7f0000000880)=0xffffffffffffff97) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) ioctl$UI_SET_RELBIT(r1, 0x40045566, 0xb) writev(r5, &(0x7f0000001240)=[{&(0x7f0000001140)="f915877a3a6225bc315439956a7137a5234834420200000000000000cdd6482a9a85a5cc0ddd358d82add465141d417bd54a1dc9c647bea582c83fb915c94754380b4e73197fe4b2e78bf8e826ff3f071b50e22f257cfb739e3a87abed3328ec61e7ea4dd9f5cdef61e319b50f3daece11390d20632fb9c632de76296509cc68ca26ea9604739efb01c00d97f4cd057c4d1277ccf2af1c880d63d3b7835f8222ad06d15508aa01000080abe24ac7721fff46c62f4f995018ce55ce5189af49b75b28fcf95b0f1db7d8e7a301c167217900000000", 0xd4}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)={0xb, 0xffffffff, 0x3c, 0x0, 0x0, r0, 0x4, [], r4, r0, 0x5, 0x2}, 0x3c) ioctl$int_in(r0, 0x800000c0045002, &(0x7f0000000000)=0x79) [ 269.579146][T21243] ^ [ 269.585826][T21243] ffff88805c316300: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 269.593877][T21243] ffff88805c316380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 269.601923][T21243] ================================================================== [ 269.609970][T21243] Disabling lock debugging due to kernel taint [ 269.626621][T21243] Kernel panic - not syncing: panic_on_warn set ... [ 269.633251][T21243] CPU: 0 PID: 21243 Comm: syz-executor.0 Tainted: G B 5.2.0+ #90 [ 269.636570][ T9237] kobject: '0:53' (000000002cf8f531): kobject_uevent_env [ 269.642263][T21243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 269.642269][T21243] Call Trace: [ 269.642293][T21243] dump_stack+0x172/0x1f0 [ 269.642311][T21243] panic+0x2dc/0x755 [ 269.642326][T21243] ? add_taint.cold+0x16/0x16 23:18:35 executing program 5 (fault-call:1 fault-nth:2): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af00, &(0x7f0000000180)) [ 269.642347][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.653138][ T9237] kobject: '0:53' (000000002cf8f531): fill_kobj_path: path = '/devices/virtual/bdi/0:53' [ 269.659414][T21243] ? preempt_schedule+0x4b/0x60 [ 269.659438][T21243] ? ___preempt_schedule+0x16/0x18 [ 269.678232][ T3902] kobject: 'loop5' (00000000542768da): kobject_uevent_env [ 269.680795][T21243] ? trace_hardirqs_on+0x5e/0x240 [ 269.680813][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.680828][T21243] end_report+0x47/0x4f [ 269.680840][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.680851][T21243] __kasan_report.cold+0xe/0x36 [ 269.680876][T21243] ? unmap_page_range+0x1e26/0x2170 [ 269.680894][T21243] kasan_report+0x12/0x17 [ 269.694289][ T9237] kobject: '0:53' (000000002cf8f531): kobject_cleanup, parent 000000002d01f1d3 [ 269.695539][T21243] __asan_report_load8_noabort+0x14/0x20 [ 269.695553][T21243] unmap_page_range+0x1e26/0x2170 [ 269.695576][T21243] ? vm_normal_page_pmd+0x420/0x420 [ 269.701877][ T9237] kobject: '0:53' (000000002cf8f531): calling ktype release [ 269.707763][T21243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 269.707777][T21243] ? uprobe_munmap+0xad/0x320 [ 269.707797][T21243] unmap_single_vma+0x19d/0x300 [ 269.722842][ T3902] kobject: 'loop5' (00000000542768da): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 269.727358][T21243] unmap_vmas+0x135/0x280 [ 269.727373][T21243] ? zap_vma_ptes+0x110/0x110 [ 269.727393][T21243] ? __kasan_check_write+0x14/0x20 [ 269.739680][ T9237] kobject: '0:53': free name [ 269.741724][T21243] exit_mmap+0x2ba/0x530 [ 269.741737][T21243] ? __ia32_sys_munmap+0x80/0x80 [ 269.741771][T21243] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 269.741791][T21243] ? __khugepaged_exit+0xcf/0x410 [ 269.781203][ T3902] kobject: 'loop3' (000000004f131705): kobject_uevent_env [ 269.784678][T21243] mmput+0x179/0x4d0 [ 269.784700][T21243] do_exit+0x84e/0x2ea0 [ 269.790079][ T3902] kobject: 'loop3' (000000004f131705): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 269.799692][T21243] ? mm_update_next_owner+0x640/0x640 [ 269.799711][T21243] ? lock_downgrade+0x920/0x920 [ 269.799725][T21243] ? _raw_spin_unlock_irq+0x28/0x90 [ 269.799737][T21243] ? get_signal+0x392/0x2500 [ 269.799747][T21243] ? _raw_spin_unlock_irq+0x28/0x90 [ 269.799761][T21243] do_group_exit+0x135/0x360 [ 269.799775][T21243] get_signal+0x47c/0x2500 [ 269.799798][T21243] ? do_vfs_ioctl+0x120/0x13e0 [ 269.903008][T21243] do_signal+0x87/0x1700 [ 269.907253][T21243] ? __fget+0x384/0x560 [ 269.911415][T21243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 269.912390][T21378] capability: warning: `syz-executor.3' uses 32-bit capabilities (legacy support in use) [ 269.917653][T21243] ? setup_sigcontext+0x7d0/0x7d0 [ 269.917670][T21243] ? kick_process+0xef/0x180 [ 269.917689][T21243] ? exit_to_usermode_loop+0x43/0x380 [ 269.917702][T21243] ? do_syscall_64+0x5a9/0x6a0 [ 269.917723][T21243] ? exit_to_usermode_loop+0x43/0x380 [ 269.952608][T21243] ? lockdep_hardirqs_on+0x418/0x5d0 [ 269.957901][T21243] ? trace_hardirqs_on+0x67/0x240 [ 269.962966][T21243] exit_to_usermode_loop+0x286/0x380 [ 269.968262][T21243] do_syscall_64+0x5a9/0x6a0 [ 269.972866][T21243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 269.978739][T21243] RIP: 0033:0x459829 [ 269.982632][T21243] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 270.002235][T21243] RSP: 002b:00007f882b03fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 270.010656][T21243] RAX: 0000000000000000 RBX: 0000000000000003 RCX: 0000000000459829 [ 270.018612][T21243] RDX: 0000000020000180 RSI: 000000004008af10 RDI: 0000000000000003 [ 270.026559][T21243] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 270.034516][T21243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f882b0406d4 [ 270.042523][T21243] R13: 00000000004c4790 R14: 00000000004d8848 R15: 00000000ffffffff [ 270.051665][T21243] Kernel Offset: disabled [ 270.055989][T21243] Rebooting in 86400 seconds..