a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:29 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:29 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x14) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:29 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r5, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:29 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:29 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:29 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:29 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x14) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:29 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:29 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:29 executing program 4: openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:29 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:29 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:29 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:29 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:29 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:29 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:29 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:30 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:30 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:30 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:30 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x0, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:30 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:30 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:30 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:30 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x0, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:30 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:30 executing program 1: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:30 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:30 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:30 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x0, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:30 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:30 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:30 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:30 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:31 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:31 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:31 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:31 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:31 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:31 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:31 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:31 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:31 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:31 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:31 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 1: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:31 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:31 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:32 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:32 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) 14:13:32 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:32 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:32 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:32 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) 14:13:32 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:32 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:32 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:32 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:32 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:32 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:32 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:32 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:32 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:32 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) 14:13:32 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:32 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:32 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:32 executing program 4: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0xfff, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:32 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:33 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:33 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:33 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:33 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:33 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:33 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:33 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:33 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:33 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:33 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:33 executing program 5: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:33 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:33 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:33 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:33 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:33 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:33 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) 14:13:34 executing program 0: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:34 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:34 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:34 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:34 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:34 executing program 0: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:34 executing program 2: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:34 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:34 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:34 executing program 2: r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0)) 14:13:34 executing program 0: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 14:13:34 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:34 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:34 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:34 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) 14:13:34 executing program 0: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 14:13:34 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:34 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:34 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:34 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:34 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:34 executing program 0: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 14:13:34 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:35 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:35 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:35 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:35 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) 14:13:35 executing program 0: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0) 14:13:35 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) 14:13:35 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:35 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:35 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) 14:13:35 executing program 0: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) 14:13:35 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:35 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) 14:13:35 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:35 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) 14:13:35 executing program 0: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:35 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:35 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:35 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:35 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) 14:13:36 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:36 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:36 executing program 0: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:36 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)) 14:13:36 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) 14:13:36 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) 14:13:36 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:36 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020}, 0x2020) 14:13:36 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) 14:13:36 executing program 0: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) 14:13:36 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) 14:13:36 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) 14:13:36 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:36 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) 14:13:36 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) 14:13:36 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) 14:13:36 executing program 0: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) 14:13:36 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:37 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) 14:13:37 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:37 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3}) 14:13:37 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) 14:13:37 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:37 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) 14:13:37 executing program 0: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) 14:13:37 executing program 5: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) 14:13:37 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) r7 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4) 14:13:37 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:37 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:37 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) 14:13:37 executing program 1: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) 14:13:37 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) r7 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10) 14:13:37 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:37 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) r7 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10) getrusage(0xffffffffffffffff, &(0x7f00000026c0)) 14:13:38 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) r7 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10) getrusage(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$RTC_UIE_ON(r4, 0x7003) 14:13:38 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) 14:13:38 executing program 0: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r3, 0x5502) r5 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0xd) read$FUSE(r5, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r6}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x24) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) r8 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r7, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10) getrusage(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$RTC_UIE_ON(r5, 0x7003) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x3f) syz_open_dev$media(&(0x7f0000002780), 0x6, 0x208c0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002b40)={&(0x7f0000002800)={0x310, 0x13, 0x300, 0x70bd28, 0x25dfdbff, {0x11, 0x6, 0x7, 0x20, {0x4e24, 0x4e22, [0x4, 0xffff, 0x8, 0x7], [0x1, 0x10000, 0x2, 0x40], r2, [0xfffffffd, 0x6]}, 0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xec, 0x1, "9019efd9b0becdfc9bf4c114bf49b1f7246aa1727193526e9a1084e6bc4091fb618872348caea970e2e6c0555f3bb6efe4370eceb16321bb59c32e5ee82efa9731248d924342bc9f79112f51f3c4e272f3ac97066c45d8a12a6dfc4b43217d51b7bc1df9c58ab4e49ab5ba349877a5ad0ba949cee6b4f13881524089386ff0ff131cea01759a508894c21ccc822b9bac5eed0f49cfcc7fc1da9d51cb83cedaa97b54bdae19c861e7f309b4476b7c6f9bde29fdd2a38027a5bec295ca3f733ed2a10caab11f32ea30983e49ac207f8617b7a9b3b921c2196911223bd710d6cb18b273e92b2d2c8eec"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "605842af52dc88b7e43f35bc248b0311c35dcd7a622367116fddc9f66b4da5b6aaf3af4ee8506b565567e97c40a1dd4a0d76f8f239d24123aa3915b41f86a724"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "c66879b90ee63afff23843e73fd51ff5bce1dee229d364489ca4a92a2ed06064f69fbefefdb384c4c273070c58e5e3aa516e796417f24217df9efeba0906b16e49af2f4dc5e8ab1c2bc03aa88dbda4870afa09a4e1fc65399f660c670ac0e8468ce9097e421c2922a90036e9541a8e8a118222dc380ad57e8e9b235ac3103d2d9d7e52cf96525f7515c50384e49930dd67e34b"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "b0ea3ec308a87640e3d31debd1117d25e204160e45590de5459c13ec8f4c4d9b28dcb88dfe78860c4d009ffcc232842b90d885a0b7f543e4c896022470324c629387b255b53f9d87b02d122ce69a2b88fcaac9f2ca844cd0c4"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "ad73b8c714b85d0a180f58bb4d7bf149706c9fb981066b793d696282c01c"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "663878c2d9bb837d605f731e8c2a8d39441ea91122c49c5af2bfc8430d736b2c77fa57543da4dc14759bd9ff57719960427b3b3e1df3201133863e0b58e2af1ee09c8c55eb2cb663670f5b4d6799fe3e8b98522c884888828f716d1de78b722a96eb20fbd0e9244c4a3555189f0cedda17"}]}, 0x310}, 0x1, 0x0, 0x0, 0x48840}, 0x8080) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x6d) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000002cc0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(digest_null-generic,ctr-cast6-avx)\x00'}, {&(0x7f0000002bc0)=""/172, 0xac}, &(0x7f0000002c80), 0x44}, 0xa0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x13) [ 440.227787][ T1227] ieee802154 phy0 wpan0: encryption failed: -22 [ 440.234413][ T1227] ieee802154 phy1 wpan1: encryption failed: -22 14:13:38 executing program 2: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r3, 0x5502) r5 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0xd) read$FUSE(r5, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r6}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x24) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) r8 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r7, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10) getrusage(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$RTC_UIE_ON(r5, 0x7003) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x3f) syz_open_dev$media(&(0x7f0000002780), 0x6, 0x208c0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002b40)={&(0x7f0000002800)={0x310, 0x13, 0x300, 0x70bd28, 0x25dfdbff, {0x11, 0x6, 0x7, 0x20, {0x4e24, 0x4e22, [0x4, 0xffff, 0x8, 0x7], [0x1, 0x10000, 0x2, 0x40], r2, [0xfffffffd, 0x6]}, 0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xec, 0x1, "9019efd9b0becdfc9bf4c114bf49b1f7246aa1727193526e9a1084e6bc4091fb618872348caea970e2e6c0555f3bb6efe4370eceb16321bb59c32e5ee82efa9731248d924342bc9f79112f51f3c4e272f3ac97066c45d8a12a6dfc4b43217d51b7bc1df9c58ab4e49ab5ba349877a5ad0ba949cee6b4f13881524089386ff0ff131cea01759a508894c21ccc822b9bac5eed0f49cfcc7fc1da9d51cb83cedaa97b54bdae19c861e7f309b4476b7c6f9bde29fdd2a38027a5bec295ca3f733ed2a10caab11f32ea30983e49ac207f8617b7a9b3b921c2196911223bd710d6cb18b273e92b2d2c8eec"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "605842af52dc88b7e43f35bc248b0311c35dcd7a622367116fddc9f66b4da5b6aaf3af4ee8506b565567e97c40a1dd4a0d76f8f239d24123aa3915b41f86a724"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "c66879b90ee63afff23843e73fd51ff5bce1dee229d364489ca4a92a2ed06064f69fbefefdb384c4c273070c58e5e3aa516e796417f24217df9efeba0906b16e49af2f4dc5e8ab1c2bc03aa88dbda4870afa09a4e1fc65399f660c670ac0e8468ce9097e421c2922a90036e9541a8e8a118222dc380ad57e8e9b235ac3103d2d9d7e52cf96525f7515c50384e49930dd67e34b"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "b0ea3ec308a87640e3d31debd1117d25e204160e45590de5459c13ec8f4c4d9b28dcb88dfe78860c4d009ffcc232842b90d885a0b7f543e4c896022470324c629387b255b53f9d87b02d122ce69a2b88fcaac9f2ca844cd0c4"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "ad73b8c714b85d0a180f58bb4d7bf149706c9fb981066b793d696282c01c"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "663878c2d9bb837d605f731e8c2a8d39441ea91122c49c5af2bfc8430d736b2c77fa57543da4dc14759bd9ff57719960427b3b3e1df3201133863e0b58e2af1ee09c8c55eb2cb663670f5b4d6799fe3e8b98522c884888828f716d1de78b722a96eb20fbd0e9244c4a3555189f0cedda17"}]}, 0x310}, 0x1, 0x0, 0x0, 0x48840}, 0x8080) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x6d) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000002cc0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(digest_null-generic,ctr-cast6-avx)\x00'}, {&(0x7f0000002bc0)=""/172, 0xac}, &(0x7f0000002c80), 0x44}, 0xa0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x13) 14:13:38 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:38 executing program 4: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r2, 0x5502) r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd) read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24) syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) socket$l2tp6(0xa, 0x2, 0x73) 14:13:38 executing program 5: ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=0xffffffffffffffff) ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}}) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10) ioctl$UI_DEV_DESTROY(r3, 0x5502) r5 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080) ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0xd) read$FUSE(r5, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r6}, {}, 0x9, 0x3}) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x24) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff) r8 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r7, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10) getrusage(0xffffffffffffffff, &(0x7f00000026c0)) ioctl$RTC_UIE_ON(r5, 0x7003) ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x3f) syz_open_dev$media(&(0x7f0000002780), 0x6, 0x208c0) sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002b40)={&(0x7f0000002800)={0x310, 0x13, 0x300, 0x70bd28, 0x25dfdbff, {0x11, 0x6, 0x7, 0x20, {0x4e24, 0x4e22, [0x4, 0xffff, 0x8, 0x7], [0x1, 0x10000, 0x2, 0x40], r2, [0xfffffffd, 0x6]}, 0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xec, 0x1, "9019efd9b0becdfc9bf4c114bf49b1f7246aa1727193526e9a1084e6bc4091fb618872348caea970e2e6c0555f3bb6efe4370eceb16321bb59c32e5ee82efa9731248d924342bc9f79112f51f3c4e272f3ac97066c45d8a12a6dfc4b43217d51b7bc1df9c58ab4e49ab5ba349877a5ad0ba949cee6b4f13881524089386ff0ff131cea01759a508894c21ccc822b9bac5eed0f49cfcc7fc1da9d51cb83cedaa97b54bdae19c861e7f309b4476b7c6f9bde29fdd2a38027a5bec295ca3f733ed2a10caab11f32ea30983e49ac207f8617b7a9b3b921c2196911223bd710d6cb18b273e92b2d2c8eec"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "605842af52dc88b7e43f35bc248b0311c35dcd7a622367116fddc9f66b4da5b6aaf3af4ee8506b565567e97c40a1dd4a0d76f8f239d24123aa3915b41f86a724"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "c66879b90ee63afff23843e73fd51ff5bce1dee229d364489ca4a92a2ed06064f69fbefefdb384c4c273070c58e5e3aa516e796417f24217df9efeba0906b16e49af2f4dc5e8ab1c2bc03aa88dbda4870afa09a4e1fc65399f660c670ac0e8468ce9097e421c2922a90036e9541a8e8a118222dc380ad57e8e9b235ac3103d2d9d7e52cf96525f7515c50384e49930dd67e34b"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "b0ea3ec308a87640e3d31debd1117d25e204160e45590de5459c13ec8f4c4d9b28dcb88dfe78860c4d009ffcc232842b90d885a0b7f543e4c896022470324c629387b255b53f9d87b02d122ce69a2b88fcaac9f2ca844cd0c4"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "ad73b8c714b85d0a180f58bb4d7bf149706c9fb981066b793d696282c01c"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "663878c2d9bb837d605f731e8c2a8d39441ea91122c49c5af2bfc8430d736b2c77fa57543da4dc14759bd9ff57719960427b3b3e1df3201133863e0b58e2af1ee09c8c55eb2cb663670f5b4d6799fe3e8b98522c884888828f716d1de78b722a96eb20fbd0e9244c4a3555189f0cedda17"}]}, 0x310}, 0x1, 0x0, 0x0, 0x48840}, 0x8080) ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x6d) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000002cc0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(digest_null-generic,ctr-cast6-avx)\x00'}, {&(0x7f0000002bc0)=""/172, 0xac}, &(0x7f0000002c80), 0x44}, 0xa0) ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x13) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002d80)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r9, 0xc04064a0, &(0x7f0000002ec0)={&(0x7f0000002dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002e00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002e40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002e80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x4, 0x4, 0x5}) 14:13:38 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)=0x0) sendmsg$NFC_CMD_LLC_SDREQ(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x1c, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 14:13:38 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:38 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)=0x0) sendmsg$NFC_CMD_LLC_SDREQ(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x1c, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 14:13:38 executing program 0: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000) r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)=0x0) sendmsg$NFC_CMD_LLC_SDREQ(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x1c, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0) 14:13:38 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:38 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:39 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]}) sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1}) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11) ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400}) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340)) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0) ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00') openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9}) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0) ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500)) write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48) r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0) fstat(r8, &(0x7f0000000680)) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff}) ioctl$RTC_PIE_ON(r6, 0x7005) ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18) r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0)) 14:13:39 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:39 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 2: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:39 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:39 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) 14:13:40 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:40 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 14:13:40 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:40 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) 14:13:40 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) 14:13:40 executing program 1: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:40 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) 14:13:40 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:40 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811) 14:13:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 14:13:40 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:40 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 1) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:40 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) 14:13:40 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) [ 442.884016][ T1674] FAULT_INJECTION: forcing a failure. [ 442.884016][ T1674] name failslab, interval 1, probability 0, space 0, times 1 [ 442.919278][ T1674] CPU: 1 PID: 1674 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 14:13:40 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) [ 442.929648][ T1674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 442.939734][ T1674] Call Trace: [ 442.943041][ T1674] [ 442.945992][ T1674] dump_stack_lvl+0x125/0x1b0 [ 442.950836][ T1674] should_fail_ex+0x496/0x5b0 [ 442.955586][ T1674] should_failslab+0x9/0x20 [ 442.960158][ T1674] kmem_cache_alloc+0x61/0x400 [ 442.964973][ T1674] getname_flags.part.0+0x50/0x4d0 [ 442.970152][ T1674] getname+0x90/0xe0 [ 442.974077][ T1674] do_sys_openat2+0x100/0x1e0 [ 442.978790][ T1674] ? build_open_flags+0x690/0x690 [ 442.983860][ T1674] __x64_sys_openat+0x175/0x210 [ 442.988749][ T1674] ? __ia32_sys_open+0x1e0/0x1e0 [ 442.993720][ T1674] ? ksys_write+0x1a7/0x250 [ 442.998257][ T1674] ? rcu_is_watching+0x12/0xb0 [ 443.003072][ T1674] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 443.009108][ T1674] do_syscall_64+0x38/0xb0 [ 443.013585][ T1674] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 443.019579][ T1674] RIP: 0033:0x7f894267cae9 14:13:40 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) [ 443.024016][ T1674] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 443.043653][ T1674] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 443.052096][ T1674] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 443.060091][ T1674] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 443.068087][ T1674] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 443.076083][ T1674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.084072][ T1674] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 443.092067][ T1674] 14:13:41 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 1) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:41 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 2) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) 14:13:41 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) [ 443.188313][ T1689] FAULT_INJECTION: forcing a failure. [ 443.188313][ T1689] name failslab, interval 1, probability 0, space 0, times 0 [ 443.202413][ T1689] CPU: 1 PID: 1689 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 443.212788][ T1689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 443.222863][ T1689] Call Trace: [ 443.226159][ T1689] [ 443.229104][ T1689] dump_stack_lvl+0x125/0x1b0 [ 443.233834][ T1689] should_fail_ex+0x496/0x5b0 14:13:41 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) [ 443.238546][ T1689] should_failslab+0x9/0x20 [ 443.243095][ T1689] kmem_cache_alloc+0x61/0x400 [ 443.247896][ T1689] getname_flags.part.0+0x50/0x4d0 [ 443.253057][ T1689] getname+0x90/0xe0 [ 443.256985][ T1689] do_sys_openat2+0x100/0x1e0 [ 443.261703][ T1689] ? build_open_flags+0x690/0x690 [ 443.266770][ T1689] __x64_sys_openat+0x175/0x210 [ 443.271661][ T1689] ? __ia32_sys_open+0x1e0/0x1e0 [ 443.276632][ T1689] ? ksys_write+0x1a7/0x250 [ 443.281156][ T1689] ? rcu_is_watching+0x12/0xb0 [ 443.285927][ T1689] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 443.291916][ T1689] do_syscall_64+0x38/0xb0 [ 443.296335][ T1689] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 443.302237][ T1689] RIP: 0033:0x7fc16a87cae9 [ 443.306652][ T1689] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 443.326275][ T1689] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 443.334698][ T1689] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9 [ 443.342675][ T1689] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 443.350650][ T1689] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000 [ 443.358623][ T1689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.366596][ T1689] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168 [ 443.374575][ T1689] [ 443.427962][ T1696] FAULT_INJECTION: forcing a failure. [ 443.427962][ T1696] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 443.446644][ T1696] CPU: 0 PID: 1696 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 443.457087][ T1696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 443.467165][ T1696] Call Trace: [ 443.470461][ T1696] [ 443.473410][ T1696] dump_stack_lvl+0x125/0x1b0 [ 443.478140][ T1696] should_fail_ex+0x496/0x5b0 [ 443.482860][ T1696] strncpy_from_user+0x38/0x300 [ 443.487754][ T1696] getname_flags.part.0+0x93/0x4d0 [ 443.492912][ T1696] getname+0x90/0xe0 [ 443.496832][ T1696] do_sys_openat2+0x100/0x1e0 [ 443.501542][ T1696] ? build_open_flags+0x690/0x690 [ 443.506608][ T1696] __x64_sys_openat+0x175/0x210 [ 443.511493][ T1696] ? __ia32_sys_open+0x1e0/0x1e0 [ 443.516464][ T1696] ? ksys_write+0x1a7/0x250 [ 443.521005][ T1696] ? rcu_is_watching+0x12/0xb0 [ 443.525799][ T1696] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 443.531816][ T1696] do_syscall_64+0x38/0xb0 [ 443.536263][ T1696] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 443.542186][ T1696] RIP: 0033:0x7f894267cae9 [ 443.546621][ T1696] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 443.566254][ T1696] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 443.574679][ T1696] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 443.582656][ T1696] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 443.590631][ T1696] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 443.598603][ T1696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 443.606578][ T1696] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 443.614557][ T1696] 14:13:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8) 14:13:41 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:41 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) 14:13:41 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 2) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:41 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) 14:13:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81) 14:13:41 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 3) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:41 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:41 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) 14:13:41 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) 14:13:41 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0) 14:13:41 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 3) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) [ 444.024737][ T1729] FAULT_INJECTION: forcing a failure. [ 444.024737][ T1729] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 444.037912][ T1729] CPU: 1 PID: 1729 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 444.048263][ T1729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 444.058323][ T1729] Call Trace: [ 444.061605][ T1729] [ 444.064536][ T1729] dump_stack_lvl+0x125/0x1b0 [ 444.069246][ T1729] should_fail_ex+0x496/0x5b0 [ 444.073931][ T1729] strncpy_from_user+0x38/0x300 [ 444.078791][ T1729] getname_flags.part.0+0x93/0x4d0 [ 444.083920][ T1729] getname+0x90/0xe0 [ 444.087817][ T1729] do_sys_openat2+0x100/0x1e0 [ 444.092503][ T1729] ? build_open_flags+0x690/0x690 [ 444.097539][ T1729] __x64_sys_openat+0x175/0x210 [ 444.102398][ T1729] ? __ia32_sys_open+0x1e0/0x1e0 [ 444.107343][ T1729] ? ksys_write+0x1a7/0x250 [ 444.111858][ T1729] ? rcu_is_watching+0x12/0xb0 [ 444.116627][ T1729] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 444.122618][ T1729] do_syscall_64+0x38/0xb0 [ 444.127040][ T1729] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 444.132968][ T1729] RIP: 0033:0x7f894267cae9 [ 444.137385][ T1729] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 444.157002][ T1729] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 444.165428][ T1729] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 14:13:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) [ 444.173406][ T1729] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 444.181381][ T1729] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 444.189353][ T1729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 444.197326][ T1729] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 444.205306][ T1729] 14:13:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) 14:13:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48) [ 444.273963][ T1736] FAULT_INJECTION: forcing a failure. [ 444.273963][ T1736] name failslab, interval 1, probability 0, space 0, times 0 14:13:42 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) [ 444.350710][ T1736] CPU: 0 PID: 1736 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 444.361086][ T1736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 444.371162][ T1736] Call Trace: [ 444.374457][ T1736] [ 444.377400][ T1736] dump_stack_lvl+0x125/0x1b0 [ 444.382129][ T1736] should_fail_ex+0x496/0x5b0 [ 444.386841][ T1736] should_failslab+0x9/0x20 [ 444.391393][ T1736] kmem_cache_alloc+0x61/0x400 [ 444.396187][ T1736] ? _parse_integer_limit+0x17f/0x1d0 [ 444.401639][ T1736] alloc_empty_file+0x73/0x1d0 [ 444.406453][ T1736] path_openat+0xdc/0x29c0 [ 444.410919][ T1736] ? __x64_sys_openat+0x175/0x210 [ 444.415982][ T1736] ? do_syscall_64+0x38/0xb0 [ 444.420609][ T1736] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 444.426713][ T1736] ? path_lookupat+0x770/0x770 [ 444.431529][ T1736] do_filp_open+0x1de/0x430 [ 444.436063][ T1736] ? may_open_dev+0xf0/0xf0 [ 444.440595][ T1736] ? expand_files+0x442/0x910 [ 444.445324][ T1736] ? _raw_spin_unlock+0x28/0x40 [ 444.450287][ T1736] ? alloc_fd+0x2da/0x6c0 [ 444.454657][ T1736] do_sys_openat2+0x176/0x1e0 [ 444.459368][ T1736] ? build_open_flags+0x690/0x690 [ 444.464436][ T1736] __x64_sys_openat+0x175/0x210 [ 444.469319][ T1736] ? __ia32_sys_open+0x1e0/0x1e0 [ 444.474291][ T1736] ? ksys_write+0x1a7/0x250 [ 444.478836][ T1736] ? rcu_is_watching+0x12/0xb0 [ 444.483631][ T1736] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 444.489651][ T1736] do_syscall_64+0x38/0xb0 [ 444.494096][ T1736] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 444.500023][ T1736] RIP: 0033:0x7fc16a87cae9 [ 444.504459][ T1736] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 444.524108][ T1736] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 444.532557][ T1736] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9 [ 444.540560][ T1736] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c 14:13:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) [ 444.548562][ T1736] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000 [ 444.556562][ T1736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 444.564556][ T1736] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168 [ 444.572559][ T1736] 14:13:42 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 4) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) [ 444.666870][ T1755] FAULT_INJECTION: forcing a failure. [ 444.666870][ T1755] name failslab, interval 1, probability 0, space 0, times 0 [ 444.679579][ T1755] CPU: 0 PID: 1755 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 444.689934][ T1755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 444.700010][ T1755] Call Trace: [ 444.703302][ T1755] [ 444.706247][ T1755] dump_stack_lvl+0x125/0x1b0 [ 444.710979][ T1755] should_fail_ex+0x496/0x5b0 [ 444.715696][ T1755] should_failslab+0x9/0x20 [ 444.720242][ T1755] kmem_cache_alloc+0x61/0x400 [ 444.725037][ T1755] ? _parse_integer_limit+0x17f/0x1d0 [ 444.730462][ T1755] alloc_empty_file+0x73/0x1d0 [ 444.735277][ T1755] path_openat+0xdc/0x29c0 [ 444.739741][ T1755] ? __x64_sys_openat+0x175/0x210 [ 444.744805][ T1755] ? do_syscall_64+0x38/0xb0 [ 444.749423][ T1755] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 444.755528][ T1755] ? path_lookupat+0x770/0x770 [ 444.760344][ T1755] do_filp_open+0x1de/0x430 [ 444.764878][ T1755] ? may_open_dev+0xf0/0xf0 [ 444.769411][ T1755] ? expand_files+0x442/0x910 [ 444.774133][ T1755] ? _raw_spin_unlock+0x28/0x40 [ 444.779025][ T1755] ? alloc_fd+0x2da/0x6c0 [ 444.783394][ T1755] do_sys_openat2+0x176/0x1e0 [ 444.788101][ T1755] ? build_open_flags+0x690/0x690 [ 444.793168][ T1755] __x64_sys_openat+0x175/0x210 [ 444.798062][ T1755] ? __ia32_sys_open+0x1e0/0x1e0 [ 444.803036][ T1755] ? ksys_write+0x1a7/0x250 [ 444.807584][ T1755] ? rcu_is_watching+0x12/0xb0 [ 444.812371][ T1755] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 444.818390][ T1755] do_syscall_64+0x38/0xb0 [ 444.822837][ T1755] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 444.828765][ T1755] RIP: 0033:0x7f894267cae9 [ 444.833204][ T1755] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 444.852868][ T1755] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 444.861311][ T1755] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 444.869303][ T1755] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 444.877291][ T1755] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 444.885291][ T1755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 444.893280][ T1755] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 444.901281][ T1755] 14:13:42 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) socket$rds(0x15, 0x5, 0x0) 14:13:42 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) 14:13:42 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 5) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:42 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 4) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:42 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:42 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)) [ 445.076034][ T1764] FAULT_INJECTION: forcing a failure. [ 445.076034][ T1764] name failslab, interval 1, probability 0, space 0, times 0 [ 445.110204][ T1764] CPU: 1 PID: 1764 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 14:13:43 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) [ 445.120571][ T1764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 445.130651][ T1764] Call Trace: [ 445.133950][ T1764] [ 445.136896][ T1764] dump_stack_lvl+0x125/0x1b0 [ 445.141619][ T1764] should_fail_ex+0x496/0x5b0 [ 445.146329][ T1764] should_failslab+0x9/0x20 [ 445.150878][ T1764] kmem_cache_alloc+0x61/0x400 [ 445.155673][ T1764] security_file_alloc+0x41/0x250 [ 445.160771][ T1764] init_file+0xb9/0x2d0 [ 445.164972][ T1764] alloc_empty_file+0x91/0x1d0 [ 445.169783][ T1764] path_openat+0xdc/0x29c0 [ 445.174256][ T1764] ? __x64_sys_openat+0x175/0x210 [ 445.179316][ T1764] ? do_syscall_64+0x38/0xb0 [ 445.183936][ T1764] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 445.190039][ T1764] ? path_lookupat+0x770/0x770 [ 445.194848][ T1764] do_filp_open+0x1de/0x430 [ 445.199379][ T1764] ? may_open_dev+0xf0/0xf0 [ 445.203908][ T1764] ? expand_files+0x442/0x910 [ 445.208627][ T1764] ? _raw_spin_unlock+0x28/0x40 [ 445.213519][ T1764] ? alloc_fd+0x2da/0x6c0 [ 445.217888][ T1764] do_sys_openat2+0x176/0x1e0 [ 445.222604][ T1764] ? build_open_flags+0x690/0x690 [ 445.226920][ T1772] FAULT_INJECTION: forcing a failure. [ 445.226920][ T1772] name failslab, interval 1, probability 0, space 0, times 0 [ 445.227645][ T1764] __x64_sys_openat+0x175/0x210 [ 445.245099][ T1764] ? __ia32_sys_open+0x1e0/0x1e0 [ 445.250068][ T1764] ? ksys_write+0x1a7/0x250 [ 445.254609][ T1764] ? rcu_is_watching+0x12/0xb0 [ 445.259401][ T1764] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 445.265418][ T1764] do_syscall_64+0x38/0xb0 [ 445.269866][ T1764] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 445.275804][ T1764] RIP: 0033:0x7f894267cae9 [ 445.280244][ T1764] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 445.299878][ T1764] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 445.308325][ T1764] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 445.316327][ T1764] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 445.324321][ T1764] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 445.332316][ T1764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.340309][ T1764] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 445.348308][ T1764] [ 445.373422][ T1772] CPU: 1 PID: 1772 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 445.383798][ T1772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 445.393874][ T1772] Call Trace: [ 445.397189][ T1772] [ 445.400138][ T1772] dump_stack_lvl+0x125/0x1b0 [ 445.404867][ T1772] should_fail_ex+0x496/0x5b0 [ 445.409579][ T1772] should_failslab+0x9/0x20 [ 445.414123][ T1772] kmem_cache_alloc+0x61/0x400 [ 445.418903][ T1772] security_file_alloc+0x41/0x250 [ 445.423953][ T1772] init_file+0xb9/0x2d0 [ 445.428128][ T1772] alloc_empty_file+0x91/0x1d0 [ 445.432912][ T1772] path_openat+0xdc/0x29c0 [ 445.437349][ T1772] ? __x64_sys_openat+0x175/0x210 [ 445.442380][ T1772] ? do_syscall_64+0x38/0xb0 [ 445.446972][ T1772] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 445.453062][ T1772] ? path_lookupat+0x770/0x770 [ 445.457846][ T1772] do_filp_open+0x1de/0x430 [ 445.462356][ T1772] ? may_open_dev+0xf0/0xf0 [ 445.466863][ T1772] ? expand_files+0x442/0x910 [ 445.471560][ T1772] ? _raw_spin_unlock+0x28/0x40 [ 445.476430][ T1772] ? alloc_fd+0x2da/0x6c0 [ 445.480778][ T1772] do_sys_openat2+0x176/0x1e0 [ 445.485470][ T1772] ? build_open_flags+0x690/0x690 [ 445.490519][ T1772] __x64_sys_openat+0x175/0x210 [ 445.495387][ T1772] ? __ia32_sys_open+0x1e0/0x1e0 [ 445.500349][ T1772] ? ksys_write+0x1a7/0x250 [ 445.504876][ T1772] ? rcu_is_watching+0x12/0xb0 [ 445.509648][ T1772] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 445.515642][ T1772] do_syscall_64+0x38/0xb0 [ 445.520072][ T1772] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 445.525974][ T1772] RIP: 0033:0x7fc16a87cae9 [ 445.530396][ T1772] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 445.550015][ T1772] RSP: 002b:00007fc16b5d20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 445.558436][ T1772] RAX: ffffffffffffffda RBX: 00007fc16a99c120 RCX: 00007fc16a87cae9 [ 445.566426][ T1772] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c 14:13:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48) [ 445.574407][ T1772] RBP: 00007fc16b5d2120 R08: 0000000000000000 R09: 0000000000000000 [ 445.582383][ T1772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 445.590358][ T1772] R13: 000000000000006e R14: 00007fc16a99c120 R15: 00007ffec7baa168 [ 445.598339][ T1772] 14:13:43 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) 14:13:43 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 6) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:43 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)) 14:13:43 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 5) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:43 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18) 14:13:43 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:43 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)) [ 445.890486][ T1790] FAULT_INJECTION: forcing a failure. [ 445.890486][ T1790] name failslab, interval 1, probability 0, space 0, times 0 14:13:43 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) [ 445.932678][ T1796] FAULT_INJECTION: forcing a failure. [ 445.932678][ T1796] name failslab, interval 1, probability 0, space 0, times 0 [ 445.953623][ T1790] CPU: 1 PID: 1790 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 445.964000][ T1790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 445.974073][ T1790] Call Trace: [ 445.977373][ T1790] [ 445.980320][ T1790] dump_stack_lvl+0x125/0x1b0 [ 445.985046][ T1790] should_fail_ex+0x496/0x5b0 [ 445.989770][ T1790] should_failslab+0x9/0x20 [ 445.994315][ T1790] __kmem_cache_alloc_node+0x5f/0x470 [ 445.999719][ T1790] ? tomoyo_encode2+0x100/0x3d0 [ 446.004605][ T1790] __kmalloc+0x4f/0x100 [ 446.008804][ T1790] tomoyo_encode2+0x100/0x3d0 [ 446.013518][ T1790] ? rcu_is_watching+0x12/0xb0 [ 446.018310][ T1790] tomoyo_encode+0x29/0x50 [ 446.022763][ T1790] tomoyo_realpath_from_path+0x196/0x710 [ 446.028429][ T1790] tomoyo_check_open_permission+0x2aa/0x3b0 [ 446.034358][ T1790] ? tomoyo_path_number_perm+0x590/0x590 [ 446.040024][ T1790] ? rcu_is_watching+0x12/0xb0 [ 446.044814][ T1790] ? lock_release+0x4bf/0x680 [ 446.049559][ T1790] ? selinux_inode_permission+0xe2/0x5f0 [ 446.055236][ T1790] ? hook_path_mknod+0x670/0x670 [ 446.060196][ T1790] ? reacquire_held_locks+0x4b0/0x4b0 [ 446.065608][ T1790] ? spin_bug+0x1d0/0x1d0 [ 446.069998][ T1790] ? make_vfsgid+0x108/0x160 [ 446.074632][ T1790] tomoyo_file_open+0xa8/0xd0 [ 446.079348][ T1790] security_file_open+0x6a/0xe0 [ 446.084208][ T1790] do_dentry_open+0x538/0x1730 [ 446.088985][ T1790] ? may_open+0x1f2/0x400 [ 446.093341][ T1790] path_openat+0x19af/0x29c0 [ 446.097975][ T1790] ? path_lookupat+0x770/0x770 [ 446.102765][ T1790] do_filp_open+0x1de/0x430 [ 446.107274][ T1790] ? may_open_dev+0xf0/0xf0 [ 446.111780][ T1790] ? expand_files+0x442/0x910 [ 446.116475][ T1790] ? _raw_spin_unlock+0x28/0x40 [ 446.121343][ T1790] ? alloc_fd+0x2da/0x6c0 [ 446.125684][ T1790] do_sys_openat2+0x176/0x1e0 [ 446.130372][ T1790] ? build_open_flags+0x690/0x690 [ 446.135410][ T1790] __x64_sys_openat+0x175/0x210 [ 446.140270][ T1790] ? __ia32_sys_open+0x1e0/0x1e0 [ 446.145216][ T1790] ? ksys_write+0x1a7/0x250 [ 446.149737][ T1790] ? rcu_is_watching+0x12/0xb0 [ 446.154507][ T1790] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 446.160502][ T1790] do_syscall_64+0x38/0xb0 [ 446.164925][ T1790] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 446.170834][ T1790] RIP: 0033:0x7f894267cae9 [ 446.175251][ T1790] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 446.194867][ T1790] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 446.203296][ T1790] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 446.211271][ T1790] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 446.219246][ T1790] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 446.227220][ T1790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 446.235191][ T1790] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 446.243172][ T1790] [ 446.249202][ T1796] CPU: 0 PID: 1796 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 446.259570][ T1796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 446.269643][ T1796] Call Trace: [ 446.272940][ T1796] [ 446.275884][ T1796] dump_stack_lvl+0x125/0x1b0 [ 446.280589][ T1796] should_fail_ex+0x496/0x5b0 [ 446.285275][ T1796] should_failslab+0x9/0x20 [ 446.289795][ T1796] kmem_cache_alloc+0x61/0x400 [ 446.294571][ T1796] security_file_alloc+0x41/0x250 [ 446.299623][ T1796] init_file+0xb9/0x2d0 [ 446.303802][ T1796] alloc_empty_file+0x91/0x1d0 [ 446.308597][ T1796] path_openat+0xdc/0x29c0 [ 446.313033][ T1796] ? __x64_sys_openat+0x175/0x210 [ 446.318066][ T1796] ? do_syscall_64+0x38/0xb0 [ 446.322659][ T1796] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 446.328752][ T1796] ? path_lookupat+0x770/0x770 [ 446.333550][ T1796] do_filp_open+0x1de/0x430 [ 446.338064][ T1796] ? may_open_dev+0xf0/0xf0 [ 446.342575][ T1796] ? expand_files+0x442/0x910 [ 446.347273][ T1796] ? _raw_spin_unlock+0x28/0x40 [ 446.352147][ T1796] ? alloc_fd+0x2da/0x6c0 [ 446.356496][ T1796] do_sys_openat2+0x176/0x1e0 [ 446.361185][ T1796] ? build_open_flags+0x690/0x690 [ 446.366222][ T1796] __x64_sys_openat+0x175/0x210 [ 446.371084][ T1796] ? __ia32_sys_open+0x1e0/0x1e0 [ 446.376031][ T1796] ? ksys_write+0x1a7/0x250 [ 446.380548][ T1796] ? rcu_is_watching+0x12/0xb0 [ 446.385326][ T1796] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 446.391318][ T1796] do_syscall_64+0x38/0xb0 [ 446.395743][ T1796] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 446.401647][ T1796] RIP: 0033:0x7fc16a87cae9 [ 446.406074][ T1796] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 446.425690][ T1796] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 446.434112][ T1796] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9 [ 446.442086][ T1796] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 446.450063][ T1796] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000 [ 446.458054][ T1796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 446.466038][ T1796] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168 [ 446.474019][ T1796] 14:13:44 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:44 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80}) 14:13:44 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) 14:13:44 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:44 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 6) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) [ 446.650833][ T1790] ERROR: Out of memory at tomoyo_realpath_from_path. 14:13:44 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 7) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:44 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:44 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) [ 446.861907][ T1820] FAULT_INJECTION: forcing a failure. [ 446.861907][ T1820] name failslab, interval 1, probability 0, space 0, times 0 [ 446.891557][ T1820] CPU: 0 PID: 1820 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 446.901934][ T1820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 446.912007][ T1820] Call Trace: [ 446.915302][ T1820] [ 446.918251][ T1820] dump_stack_lvl+0x125/0x1b0 [ 446.922982][ T1820] should_fail_ex+0x496/0x5b0 [ 446.927698][ T1820] should_failslab+0x9/0x20 [ 446.932242][ T1820] __kmem_cache_alloc_node+0x5f/0x470 [ 446.937651][ T1820] ? tomoyo_encode2+0x100/0x3d0 [ 446.942542][ T1820] __kmalloc+0x4f/0x100 [ 446.946736][ T1820] tomoyo_encode2+0x100/0x3d0 [ 446.951435][ T1820] ? rcu_is_watching+0x12/0xb0 [ 446.956204][ T1820] tomoyo_encode+0x29/0x50 [ 446.960629][ T1820] tomoyo_realpath_from_path+0x196/0x710 [ 446.966275][ T1820] tomoyo_check_open_permission+0x2aa/0x3b0 [ 446.972180][ T1820] ? tomoyo_path_number_perm+0x590/0x590 [ 446.977820][ T1820] ? rcu_is_watching+0x12/0xb0 [ 446.982593][ T1820] ? lock_release+0x4bf/0x680 [ 446.987289][ T1820] ? selinux_inode_permission+0xe2/0x5f0 [ 446.992942][ T1820] ? hook_path_mknod+0x670/0x670 [ 446.997885][ T1820] ? reacquire_held_locks+0x4b0/0x4b0 [ 447.003278][ T1820] ? spin_bug+0x1d0/0x1d0 [ 447.007623][ T1820] ? make_vfsgid+0x108/0x160 [ 447.012229][ T1820] tomoyo_file_open+0xa8/0xd0 [ 447.016925][ T1820] security_file_open+0x6a/0xe0 [ 447.021785][ T1820] do_dentry_open+0x538/0x1730 [ 447.026558][ T1820] ? may_open+0x1f2/0x400 [ 447.030909][ T1820] path_openat+0x19af/0x29c0 [ 447.035526][ T1820] ? path_lookupat+0x770/0x770 [ 447.040313][ T1820] do_filp_open+0x1de/0x430 [ 447.044825][ T1820] ? may_open_dev+0xf0/0xf0 [ 447.049333][ T1820] ? expand_files+0x442/0x910 [ 447.054027][ T1820] ? _raw_spin_unlock+0x28/0x40 [ 447.058896][ T1820] ? alloc_fd+0x2da/0x6c0 [ 447.063239][ T1820] do_sys_openat2+0x176/0x1e0 [ 447.067929][ T1820] ? build_open_flags+0x690/0x690 [ 447.072965][ T1820] __x64_sys_openat+0x175/0x210 [ 447.077825][ T1820] ? __ia32_sys_open+0x1e0/0x1e0 [ 447.082775][ T1820] ? ksys_write+0x1a7/0x250 [ 447.087292][ T1820] ? rcu_is_watching+0x12/0xb0 [ 447.092060][ T1820] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 447.098054][ T1820] do_syscall_64+0x38/0xb0 [ 447.102478][ T1820] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 447.108381][ T1820] RIP: 0033:0x7fc16a87cae9 [ 447.112804][ T1820] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 447.132421][ T1820] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 447.140843][ T1820] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9 [ 447.148818][ T1820] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 447.156792][ T1820] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000 [ 447.164765][ T1820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.172737][ T1820] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168 [ 447.180715][ T1820] 14:13:45 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) fstat(0xffffffffffffffff, &(0x7f0000000b40)) 14:13:45 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:45 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) 14:13:45 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) [ 447.273597][ T1820] ERROR: Out of memory at tomoyo_realpath_from_path. 14:13:45 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 8) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:45 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880) 14:13:45 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:45 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) 14:13:45 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 7) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) [ 447.436041][ T1853] FAULT_INJECTION: forcing a failure. [ 447.436041][ T1853] name failslab, interval 1, probability 0, space 0, times 0 [ 447.496461][ T1853] CPU: 1 PID: 1853 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 447.506842][ T1853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 447.516929][ T1853] Call Trace: [ 447.520229][ T1853] [ 447.523179][ T1853] dump_stack_lvl+0x125/0x1b0 [ 447.527909][ T1853] should_fail_ex+0x496/0x5b0 [ 447.532631][ T1853] should_failslab+0x9/0x20 [ 447.537181][ T1853] __kmem_cache_alloc_node+0x5f/0x470 [ 447.542589][ T1853] kmalloc_trace+0x25/0xe0 [ 447.547045][ T1853] nci_allocate_device+0x105/0x430 [ 447.552305][ T1853] virtual_ncidev_open+0x6f/0x220 [ 447.557431][ T1853] ? virtual_ncidev_read+0x4e0/0x4e0 [ 447.562747][ T1853] misc_open+0x3da/0x4c0 [ 447.567049][ T1853] ? misc_devnode+0x120/0x120 [ 447.571762][ T1853] chrdev_open+0x277/0x700 [ 447.576195][ T1853] ? __unregister_chrdev+0x100/0x100 [ 447.581487][ T1853] ? fsnotify_perm.part.0+0x25d/0x630 [ 447.586905][ T1853] ? fsnotify_perm.part.0+0x268/0x630 [ 447.592303][ T1853] do_dentry_open+0x88b/0x1730 [ 447.597096][ T1853] ? __unregister_chrdev+0x100/0x100 [ 447.602402][ T1853] ? may_open+0x1f2/0x400 [ 447.606760][ T1853] path_openat+0x19af/0x29c0 [ 447.611380][ T1853] ? path_lookupat+0x770/0x770 [ 447.616167][ T1853] do_filp_open+0x1de/0x430 [ 447.620679][ T1853] ? may_open_dev+0xf0/0xf0 [ 447.625186][ T1853] ? expand_files+0x442/0x910 [ 447.629884][ T1853] ? _raw_spin_unlock+0x28/0x40 [ 447.634764][ T1853] ? alloc_fd+0x2da/0x6c0 [ 447.639104][ T1853] do_sys_openat2+0x176/0x1e0 [ 447.643790][ T1853] ? build_open_flags+0x690/0x690 [ 447.648831][ T1853] __x64_sys_openat+0x175/0x210 [ 447.653699][ T1853] ? __ia32_sys_open+0x1e0/0x1e0 [ 447.658645][ T1853] ? ksys_write+0x1a7/0x250 [ 447.663173][ T1853] ? rcu_is_watching+0x12/0xb0 [ 447.667948][ T1853] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 447.673941][ T1853] do_syscall_64+0x38/0xb0 [ 447.678366][ T1853] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 447.684276][ T1853] RIP: 0033:0x7f894267cae9 [ 447.688696][ T1853] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 447.708316][ T1853] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 447.716745][ T1853] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 447.724723][ T1853] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 447.732700][ T1853] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 447.740677][ T1853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.748652][ T1853] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 447.756631][ T1853] 14:13:45 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:45 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) 14:13:45 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 9) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:45 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:45 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r4, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:46 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 8) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:46 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) [ 448.237988][ T1884] FAULT_INJECTION: forcing a failure. [ 448.237988][ T1884] name failslab, interval 1, probability 0, space 0, times 0 [ 448.285283][ T1884] CPU: 0 PID: 1884 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 448.295667][ T1884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 448.305747][ T1884] Call Trace: [ 448.309048][ T1884] [ 448.312003][ T1884] dump_stack_lvl+0x125/0x1b0 [ 448.316731][ T1884] should_fail_ex+0x496/0x5b0 [ 448.321451][ T1884] should_failslab+0x9/0x20 [ 448.326014][ T1884] __kmem_cache_alloc_node+0x5f/0x470 [ 448.331427][ T1884] kmalloc_trace+0x25/0xe0 [ 448.335890][ T1884] nci_allocate_device+0x105/0x430 [ 448.341047][ T1884] virtual_ncidev_open+0x6f/0x220 [ 448.346105][ T1884] ? virtual_ncidev_read+0x4e0/0x4e0 [ 448.351429][ T1884] misc_open+0x3da/0x4c0 [ 448.355708][ T1884] ? misc_devnode+0x120/0x120 [ 448.360432][ T1884] chrdev_open+0x277/0x700 [ 448.364884][ T1884] ? __unregister_chrdev+0x100/0x100 [ 448.370206][ T1884] ? fsnotify_perm.part.0+0x25d/0x630 [ 448.375621][ T1884] ? fsnotify_perm.part.0+0x268/0x630 [ 448.381038][ T1884] do_dentry_open+0x88b/0x1730 [ 448.385831][ T1884] ? __unregister_chrdev+0x100/0x100 [ 448.391132][ T1884] ? may_open+0x1f2/0x400 [ 448.395486][ T1884] path_openat+0x19af/0x29c0 [ 448.400102][ T1884] ? path_lookupat+0x770/0x770 [ 448.404892][ T1884] do_filp_open+0x1de/0x430 [ 448.409404][ T1884] ? may_open_dev+0xf0/0xf0 [ 448.413913][ T1884] ? expand_files+0x442/0x910 [ 448.418606][ T1884] ? _raw_spin_unlock+0x28/0x40 [ 448.423476][ T1884] ? alloc_fd+0x2da/0x6c0 [ 448.427819][ T1884] do_sys_openat2+0x176/0x1e0 [ 448.432508][ T1884] ? build_open_flags+0x690/0x690 [ 448.437548][ T1884] __x64_sys_openat+0x175/0x210 [ 448.442411][ T1884] ? __ia32_sys_open+0x1e0/0x1e0 [ 448.447361][ T1884] ? ksys_write+0x1a7/0x250 [ 448.451878][ T1884] ? rcu_is_watching+0x12/0xb0 [ 448.456671][ T1884] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 448.462673][ T1884] do_syscall_64+0x38/0xb0 [ 448.467102][ T1884] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 448.473016][ T1884] RIP: 0033:0x7f894267cae9 [ 448.477435][ T1884] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 448.497061][ T1884] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 448.505491][ T1884] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 448.513468][ T1884] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 448.521452][ T1884] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 448.529439][ T1884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 448.537416][ T1884] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 448.545398][ T1884] [ 448.553362][ T1889] FAULT_INJECTION: forcing a failure. [ 448.553362][ T1889] name failslab, interval 1, probability 0, space 0, times 0 [ 448.576113][ T1889] CPU: 0 PID: 1889 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 448.586475][ T1889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 448.596530][ T1889] Call Trace: [ 448.599808][ T1889] [ 448.602738][ T1889] dump_stack_lvl+0x125/0x1b0 [ 448.607440][ T1889] should_fail_ex+0x496/0x5b0 [ 448.612126][ T1889] should_failslab+0x9/0x20 [ 448.616641][ T1889] __kmem_cache_alloc_node+0x5f/0x470 [ 448.622024][ T1889] ? tomoyo_encode2+0x100/0x3d0 [ 448.626886][ T1889] __kmalloc+0x4f/0x100 [ 448.631061][ T1889] tomoyo_encode2+0x100/0x3d0 [ 448.635750][ T1889] ? rcu_is_watching+0x12/0xb0 [ 448.640520][ T1889] tomoyo_encode+0x29/0x50 [ 448.644946][ T1889] tomoyo_realpath_from_path+0x196/0x710 [ 448.650591][ T1889] tomoyo_check_open_permission+0x2aa/0x3b0 [ 448.656495][ T1889] ? tomoyo_path_number_perm+0x590/0x590 [ 448.662138][ T1889] ? rcu_is_watching+0x12/0xb0 [ 448.666912][ T1889] ? lock_release+0x4bf/0x680 [ 448.671602][ T1889] ? selinux_inode_permission+0xe2/0x5f0 [ 448.677253][ T1889] ? hook_path_mknod+0x670/0x670 [ 448.682207][ T1889] ? reacquire_held_locks+0x4b0/0x4b0 [ 448.687598][ T1889] ? spin_bug+0x1d0/0x1d0 [ 448.691947][ T1889] ? make_vfsgid+0x108/0x160 [ 448.696550][ T1889] tomoyo_file_open+0xa8/0xd0 [ 448.701332][ T1889] security_file_open+0x6a/0xe0 [ 448.706201][ T1889] do_dentry_open+0x538/0x1730 [ 448.710977][ T1889] ? may_open+0x1f2/0x400 [ 448.715330][ T1889] path_openat+0x19af/0x29c0 [ 448.719953][ T1889] ? path_lookupat+0x770/0x770 [ 448.724745][ T1889] do_filp_open+0x1de/0x430 [ 448.729254][ T1889] ? may_open_dev+0xf0/0xf0 [ 448.733767][ T1889] ? expand_files+0x442/0x910 [ 448.738463][ T1889] ? _raw_spin_unlock+0x28/0x40 [ 448.743335][ T1889] ? alloc_fd+0x2da/0x6c0 [ 448.747679][ T1889] do_sys_openat2+0x176/0x1e0 [ 448.752369][ T1889] ? build_open_flags+0x690/0x690 [ 448.757411][ T1889] __x64_sys_openat+0x175/0x210 [ 448.762277][ T1889] ? __ia32_sys_open+0x1e0/0x1e0 [ 448.767227][ T1889] ? ksys_write+0x1a7/0x250 [ 448.771747][ T1889] ? rcu_is_watching+0x12/0xb0 [ 448.776518][ T1889] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 448.782509][ T1889] do_syscall_64+0x38/0xb0 [ 448.786936][ T1889] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 448.792842][ T1889] RIP: 0033:0x7fc16a87cae9 [ 448.797263][ T1889] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 448.816876][ T1889] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 448.825296][ T1889] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9 [ 448.833274][ T1889] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 448.841247][ T1889] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000 [ 448.849223][ T1889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 448.857202][ T1889] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168 [ 448.865191][ T1889] 14:13:46 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 10) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:46 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) [ 448.948383][ T1889] ERROR: Out of memory at tomoyo_realpath_from_path. 14:13:46 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r4, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) 14:13:46 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r4, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:47 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:47 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:47 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) 14:13:47 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:47 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5}) [ 449.079756][ T1889] workqueue: Failed to create a rescuer kthread for wq "nfc3_nci_tx_wq": -EINTR [ 449.316926][ T1916] FAULT_INJECTION: forcing a failure. [ 449.316926][ T1916] name failslab, interval 1, probability 0, space 0, times 0 [ 449.352202][ T1916] CPU: 1 PID: 1916 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 449.362572][ T1916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 449.372641][ T1916] Call Trace: [ 449.375924][ T1916] [ 449.378853][ T1916] dump_stack_lvl+0x125/0x1b0 [ 449.383557][ T1916] should_fail_ex+0x496/0x5b0 [ 449.388242][ T1916] should_failslab+0x9/0x20 [ 449.392757][ T1916] __kmem_cache_alloc_node+0x5f/0x470 [ 449.398139][ T1916] kmalloc_trace+0x25/0xe0 [ 449.402571][ T1916] nci_allocate_device+0x105/0x430 [ 449.407701][ T1916] virtual_ncidev_open+0x6f/0x220 [ 449.412749][ T1916] ? virtual_ncidev_read+0x4e0/0x4e0 [ 449.418039][ T1916] misc_open+0x3da/0x4c0 [ 449.422293][ T1916] ? misc_devnode+0x120/0x120 [ 449.426980][ T1916] chrdev_open+0x277/0x700 [ 449.431403][ T1916] ? __unregister_chrdev+0x100/0x100 [ 449.436691][ T1916] ? fsnotify_perm.part.0+0x25d/0x630 [ 449.442082][ T1916] ? fsnotify_perm.part.0+0x268/0x630 [ 449.447479][ T1916] do_dentry_open+0x88b/0x1730 [ 449.452255][ T1916] ? __unregister_chrdev+0x100/0x100 [ 449.457551][ T1916] ? may_open+0x1f2/0x400 [ 449.461899][ T1916] path_openat+0x19af/0x29c0 [ 449.466532][ T1916] ? path_lookupat+0x770/0x770 [ 449.471329][ T1916] do_filp_open+0x1de/0x430 [ 449.475838][ T1916] ? may_open_dev+0xf0/0xf0 [ 449.480346][ T1916] ? expand_files+0x442/0x910 [ 449.485044][ T1916] ? _raw_spin_unlock+0x28/0x40 [ 449.489914][ T1916] ? alloc_fd+0x2da/0x6c0 [ 449.494257][ T1916] do_sys_openat2+0x176/0x1e0 [ 449.498943][ T1916] ? build_open_flags+0x690/0x690 [ 449.503979][ T1916] __x64_sys_openat+0x175/0x210 [ 449.508839][ T1916] ? __ia32_sys_open+0x1e0/0x1e0 [ 449.513785][ T1916] ? ksys_write+0x1a7/0x250 [ 449.518300][ T1916] ? rcu_is_watching+0x12/0xb0 [ 449.523070][ T1916] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 449.529061][ T1916] do_syscall_64+0x38/0xb0 [ 449.533484][ T1916] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 449.539385][ T1916] RIP: 0033:0x7f894267cae9 [ 449.543803][ T1916] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 449.563417][ T1916] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 449.571839][ T1916] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 449.579820][ T1916] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 449.587797][ T1916] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 449.595771][ T1916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 449.603746][ T1916] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 449.611723][ T1916] 14:13:47 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:47 executing program 1: syz_open_dev$vcsu(0x0, 0x0, 0x0) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 11) syz_open_dev$vcsn(0x0, 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x8300) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0)) 14:13:47 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) 14:13:47 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) 14:13:47 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, 0x0) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) 14:13:47 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x3, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:47 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0) ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227}) sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c) 14:13:47 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80) syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0) 14:13:47 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0) sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0) sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10) syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0) [ 450.031419][ T1959] FAULT_INJECTION: forcing a failure. [ 450.031419][ T1959] name failslab, interval 1, probability 0, space 0, times 0 14:13:47 executing program 4: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x4, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3) 14:13:47 executing program 3: r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb) setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10) r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000) ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) fstat(r1, &(0x7f0000000100)) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) fstat(r3, &(0x7f0000000200)) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0) write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48) r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}}) ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800)) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=0x0) sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00)) ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x3) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c) [ 450.125311][ T1959] CPU: 0 PID: 1959 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 450.135684][ T1959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 450.145761][ T1959] Call Trace: [ 450.149063][ T1959] [ 450.152011][ T1959] dump_stack_lvl+0x125/0x1b0 [ 450.156739][ T1959] should_fail_ex+0x496/0x5b0 [ 450.161455][ T1959] ? kvasprintf_const+0x66/0x190 [ 450.166463][ T1959] ? kvasprintf_const+0x66/0x190 [ 450.171472][ T1959] should_failslab+0x9/0x20 [ 450.176019][ T1959] __kmem_cache_alloc_node+0x5f/0x470 [ 450.181434][ T1959] ? pointer+0xbf0/0xbf0 [ 450.185746][ T1959] ? kvasprintf_const+0x66/0x190 [ 450.190723][ T1959] __kmalloc_node_track_caller+0x50/0x100 [ 450.196491][ T1959] kvasprintf+0xbd/0x150 [ 450.200779][ T1959] ? bust_spinlocks+0xe0/0xe0 [ 450.205494][ T1959] ? rcu_is_watching+0x12/0xb0 [ 450.210276][ T1959] kvasprintf_const+0x66/0x190 [ 450.215073][ T1959] kobject_set_name_vargs+0x5a/0x130 [ 450.220396][ T1959] dev_set_name+0xc8/0x100 [ 450.224952][ T1959] ? device_initialize+0x510/0x510 [ 450.230116][ T1959] nfc_allocate_device+0x206/0x5e0 [ 450.235331][ T1959] nci_allocate_device+0x23b/0x430 [ 450.240484][ T1959] virtual_ncidev_open+0x6f/0x220 [ 450.245536][ T1959] ? virtual_ncidev_read+0x4e0/0x4e0 [ 450.250844][ T1959] misc_open+0x3da/0x4c0 [ 450.255137][ T1959] ? misc_devnode+0x120/0x120 [ 450.259855][ T1959] chrdev_open+0x277/0x700 [ 450.264297][ T1959] ? __unregister_chrdev+0x100/0x100 [ 450.269607][ T1959] ? fsnotify_perm.part.0+0x25d/0x630 [ 450.275012][ T1959] ? fsnotify_perm.part.0+0x268/0x630 [ 450.280429][ T1959] do_dentry_open+0x88b/0x1730 [ 450.285230][ T1959] ? __unregister_chrdev+0x100/0x100 [ 450.290548][ T1959] ? may_open+0x1f2/0x400 [ 450.294929][ T1959] path_openat+0x19af/0x29c0 [ 450.299579][ T1959] ? path_lookupat+0x770/0x770 [ 450.304391][ T1959] do_filp_open+0x1de/0x430 [ 450.308917][ T1959] ? may_open_dev+0xf0/0xf0 [ 450.313447][ T1959] ? expand_files+0x442/0x910 [ 450.318165][ T1959] ? _raw_spin_unlock+0x28/0x40 [ 450.323058][ T1959] ? alloc_fd+0x2da/0x6c0 [ 450.327425][ T1959] do_sys_openat2+0x176/0x1e0 [ 450.332136][ T1959] ? build_open_flags+0x690/0x690 [ 450.337189][ T1959] __x64_sys_openat+0x175/0x210 [ 450.342079][ T1959] ? __ia32_sys_open+0x1e0/0x1e0 [ 450.347045][ T1959] ? ksys_write+0x1a7/0x250 [ 450.351578][ T1959] ? rcu_is_watching+0x12/0xb0 [ 450.356371][ T1959] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 450.362389][ T1959] do_syscall_64+0x38/0xb0 [ 450.366838][ T1959] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 450.372771][ T1959] RIP: 0033:0x7f894267cae9 [ 450.377209][ T1959] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 450.396842][ T1959] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 450.405289][ T1959] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 450.413288][ T1959] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 450.421289][ T1959] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 450.429283][ T1959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 450.437276][ T1959] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 450.445278][ T1959] [ 450.548497][ T1959] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 450.560264][ T1959] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 450.568691][ T1959] CPU: 1 PID: 1959 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0 [ 450.579041][ T1959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 [ 450.589112][ T1959] RIP: 0010:strchr+0x1b/0xb0 [ 450.593742][ T1959] Code: 9e ab f7 48 8b 74 24 08 48 8b 14 24 eb 89 90 f3 0f 1e fa 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 83 ec 10 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 51 0f b6 07 89 [ 450.613376][ T1959] RSP: 0018:ffffc90004b0f630 EFLAGS: 00010286 [ 450.619466][ T1959] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009fb1000 [ 450.627455][ T1959] RDX: 0000000000000000 RSI: 0000000000000025 RDI: 0000000000000000 [ 450.635440][ T1959] RBP: ffffc90004b0f6c0 R08: 0000000000000001 R09: 0000000000000000 [ 450.643429][ T1959] R10: 0000000000000001 R11: 0000000000000000 R12: ffffc90004b0f6c0 [ 450.651422][ T1959] R13: 0000000000000cc0 R14: ffff888141375c80 R15: 0000000000000001 [ 450.659417][ T1959] FS: 00007f89433956c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 450.668381][ T1959] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 450.674996][ T1959] CR2: 00007fc16b56fd58 CR3: 000000002b3cb000 CR4: 00000000003506e0 [ 450.682996][ T1959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 450.690992][ T1959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 450.698985][ T1959] Call Trace: [ 450.702279][ T1959] [ 450.705225][ T1959] ? show_regs+0x8f/0xa0 [ 450.709531][ T1959] ? die_addr+0x4f/0xd0 [ 450.713733][ T1959] ? exc_general_protection+0x154/0x230 [ 450.719323][ T1959] ? asm_exc_general_protection+0x26/0x30 [ 450.725080][ T1959] ? strchr+0x1b/0xb0 [ 450.729086][ T1959] ? __mutex_unlock_slowpath+0x165/0x640 [ 450.734748][ T1959] kvasprintf_const+0x25/0x190 [ 450.739551][ T1959] kobject_set_name_vargs+0x5a/0x130 [ 450.744872][ T1959] kobject_add+0x12a/0x240 [ 450.749329][ T1959] ? kset_create_and_add+0x190/0x190 [ 450.754657][ T1959] ? do_raw_spin_unlock+0x173/0x230 [ 450.759905][ T1959] ? kobject_put+0xbe/0x440 [ 450.764445][ T1959] device_add+0x290/0x1ac0 [ 450.768920][ T1959] ? reacquire_held_locks+0x4b0/0x4b0 [ 450.774332][ T1959] ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270 [ 450.781219][ T1959] ? lockdep_init_map_type+0x16d/0x7c0 [ 450.786724][ T1959] nfc_register_device+0x41/0x3c0 [ 450.791802][ T1959] nci_register_device+0x7f4/0xb80 [ 450.796958][ T1959] ? nci_init_complete_req+0x410/0x410 [ 450.802462][ T1959] ? lockdep_init_map_type+0x16d/0x7c0 [ 450.807972][ T1959] virtual_ncidev_open+0x147/0x220 [ 450.813122][ T1959] ? virtual_ncidev_read+0x4e0/0x4e0 [ 450.818447][ T1959] misc_open+0x3da/0x4c0 [ 450.822732][ T1959] ? misc_devnode+0x120/0x120 [ 450.827450][ T1959] chrdev_open+0x277/0x700 [ 450.831895][ T1959] ? __unregister_chrdev+0x100/0x100 [ 450.837203][ T1959] ? fsnotify_perm.part.0+0x25d/0x630 [ 450.842614][ T1959] ? fsnotify_perm.part.0+0x268/0x630 [ 450.848021][ T1959] do_dentry_open+0x88b/0x1730 [ 450.852804][ T1959] ? __unregister_chrdev+0x100/0x100 [ 450.858120][ T1959] ? may_open+0x1f2/0x400 [ 450.862496][ T1959] path_openat+0x19af/0x29c0 [ 450.867145][ T1959] ? path_lookupat+0x770/0x770 [ 450.871957][ T1959] do_filp_open+0x1de/0x430 [ 450.876492][ T1959] ? may_open_dev+0xf0/0xf0 [ 450.881022][ T1959] ? expand_files+0x442/0x910 [ 450.885741][ T1959] ? _raw_spin_unlock+0x28/0x40 [ 450.890632][ T1959] ? alloc_fd+0x2da/0x6c0 [ 450.894989][ T1959] do_sys_openat2+0x176/0x1e0 [ 450.899698][ T1959] ? build_open_flags+0x690/0x690 [ 450.904761][ T1959] __x64_sys_openat+0x175/0x210 [ 450.909646][ T1959] ? __ia32_sys_open+0x1e0/0x1e0 [ 450.914620][ T1959] ? ksys_write+0x1a7/0x250 [ 450.919167][ T1959] ? rcu_is_watching+0x12/0xb0 [ 450.923967][ T1959] ? trace_irq_enable.constprop.0+0xd0/0x100 [ 450.929982][ T1959] do_syscall_64+0x38/0xb0 [ 450.934434][ T1959] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 450.940365][ T1959] RIP: 0033:0x7f894267cae9 [ 450.944800][ T1959] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48 [ 450.964440][ T1959] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 450.972878][ T1959] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9 [ 450.980873][ T1959] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c [ 450.988870][ T1959] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000 [ 450.996859][ T1959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 451.004850][ T1959] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28 [ 451.012853][ T1959] [ 451.015888][ T1959] Modules linked in: [ 451.085913][ T1959] ---[ end trace 0000000000000000 ]--- [ 451.133626][ T1959] RIP: 0010:strchr+0x1b/0xb0 [ 451.138411][ T1959] Code: 9e ab f7 48 8b 74 24 08 48 8b 14 24 eb 89 90 f3 0f 1e fa 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 83 ec 10 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 51 0f b6 07 89 [ 451.159095][ T1959] RSP: 0018:ffffc90004b0f630 EFLAGS: 00010286 [ 451.165639][ T1959] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009fb1000 [ 451.173858][ T1959] RDX: 0000000000000000 RSI: 0000000000000025 RDI: 0000000000000000 [ 451.178129][ T27] audit: type=1400 audit(1694787229.024:139): avc: denied { rename } for pid=4467 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.181842][ T1959] RBP: ffffc90004b0f6c0 R08: 0000000000000001 R09: 0000000000000000 [ 451.181862][ T1959] R10: 0000000000000001 R11: 0000000000000000 R12: ffffc90004b0f6c0 [ 451.181880][ T1959] R13: 0000000000000cc0 R14: ffff888141375c80 R15: 0000000000000001 [ 451.181900][ T1959] FS: 00007f89433956c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000 [ 451.250640][ T27] audit: type=1400 audit(1694787229.024:140): avc: denied { unlink } for pid=4467 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.268918][ T1959] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 451.301732][ T27] audit: type=1400 audit(1694787229.024:141): avc: denied { create } for pid=4467 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 451.404121][ T1959] CR2: 00007fc16b56fd58 CR3: 000000002b3cb000 CR4: 00000000003506e0 [ 451.444893][ T1959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 451.470146][ T1959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 451.478514][ T1959] Kernel panic - not syncing: Fatal exception [ 451.484779][ T1959] Kernel Offset: disabled [ 451.489091][ T1959] Rebooting in 86400 seconds..