a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:29 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:29 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
r1 = syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x14)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:29 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r6=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r5, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r6}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:29 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:29 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:29 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:29 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x14)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:29 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:29 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:29 executing program 4:
openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:29 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:29 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:29 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:29 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(0xffffffffffffffff, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:29 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:29 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:29 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:30 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:30 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:30 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:30 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x0, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:30 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:30 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:30 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x0, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:30 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x0, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:30 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:30 executing program 1:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:30 executing program 5:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:30 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r6, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:30 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x0, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:30 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:30 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:30 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:30 executing program 5:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:31 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:31 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:31 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:31 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:31 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:31 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:31 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:31 executing program 4:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, 0x0, 0x40, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:31 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:31 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x0, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:31 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 5:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 1:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:31 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:31 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:32 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:32 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)

14:13:32 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:32 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:32 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:32 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))

14:13:32 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:32 executing program 4:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:32 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:32 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:32 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:32 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:32 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:32 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:32 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:32 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)

14:13:32 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:32 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:32 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:32 executing program 4:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0xfff, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:32 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:33 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:33 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:33 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:33 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:33 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
ioctl$UI_SET_KEYBIT(0xffffffffffffffff, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:33 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:33 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:33 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:33 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:33 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:33 executing program 5:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:33 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:33 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:33 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:33 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:33 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:33 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)

14:13:34 executing program 0:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:34 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:34 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:34 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:34 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:34 executing program 0:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:34 executing program 2:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:34 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:34 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:34 executing program 2:
r0 = syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000008c0))

14:13:34 executing program 0:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0)

14:13:34 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:34 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:34 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:34 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))

14:13:34 executing program 0:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0)

14:13:34 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:34 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:34 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:34 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:34 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:34 executing program 0:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0)

14:13:34 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:35 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:35 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:35 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:35 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))

14:13:35 executing program 0:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, 0x0)

14:13:35 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))

14:13:35 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:35 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:35 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))

14:13:35 executing program 0:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))

14:13:35 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:35 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))

14:13:35 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:35 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))

14:13:35 executing program 0:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:35 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:35 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:35 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:35 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r4 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r4, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r5 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r5, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)

14:13:36 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:36 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:36 executing program 0:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:36 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40))

14:13:36 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))

14:13:36 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))

14:13:36 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0))
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:36 executing program 0:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
read$FUSE(0xffffffffffffffff, &(0x7f0000000480)={0x2020}, 0x2020)

14:13:36 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)

14:13:36 executing program 0:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)

14:13:36 executing program 5:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000))
openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)

14:13:36 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))

14:13:36 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:36 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))

14:13:36 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))

14:13:36 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)

14:13:36 executing program 0:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)

14:13:36 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:37 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))

14:13:37 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:37 executing program 5:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd)
read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3})

14:13:37 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)

14:13:37 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:37 executing program 0:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)

14:13:37 executing program 0:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)

14:13:37 executing program 5:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)

14:13:37 executing program 4:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd)
read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24)
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
r7 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4)

14:13:37 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:37 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:37 executing program 2:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', 0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)

14:13:37 executing program 1:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)

14:13:37 executing program 0:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd)
read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24)
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
r7 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4)
setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10)

14:13:37 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r9, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:37 executing program 5:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd)
read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24)
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
r7 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4)
setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10)
getrusage(0xffffffffffffffff, &(0x7f00000026c0))

14:13:38 executing program 4:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd)
read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24)
r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
r7 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg$L2TP_CMD_NOOP(r4, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r6, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r7}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4)
setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10)
getrusage(0xffffffffffffffff, &(0x7f00000026c0))
ioctl$RTC_UIE_ON(r4, 0x7003)

14:13:38 executing program 2:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd)

14:13:38 executing program 0:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', <r2=>r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r3, 0x5502)
r5 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0xd)
read$FUSE(r5, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r6}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x24)
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
r8 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r7, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4)
setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10)
getrusage(0xffffffffffffffff, &(0x7f00000026c0))
ioctl$RTC_UIE_ON(r5, 0x7003)
ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x3f)
syz_open_dev$media(&(0x7f0000002780), 0x6, 0x208c0)
sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002b40)={&(0x7f0000002800)={0x310, 0x13, 0x300, 0x70bd28, 0x25dfdbff, {0x11, 0x6, 0x7, 0x20, {0x4e24, 0x4e22, [0x4, 0xffff, 0x8, 0x7], [0x1, 0x10000, 0x2, 0x40], r2, [0xfffffffd, 0x6]}, 0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xec, 0x1, "9019efd9b0becdfc9bf4c114bf49b1f7246aa1727193526e9a1084e6bc4091fb618872348caea970e2e6c0555f3bb6efe4370eceb16321bb59c32e5ee82efa9731248d924342bc9f79112f51f3c4e272f3ac97066c45d8a12a6dfc4b43217d51b7bc1df9c58ab4e49ab5ba349877a5ad0ba949cee6b4f13881524089386ff0ff131cea01759a508894c21ccc822b9bac5eed0f49cfcc7fc1da9d51cb83cedaa97b54bdae19c861e7f309b4476b7c6f9bde29fdd2a38027a5bec295ca3f733ed2a10caab11f32ea30983e49ac207f8617b7a9b3b921c2196911223bd710d6cb18b273e92b2d2c8eec"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "605842af52dc88b7e43f35bc248b0311c35dcd7a622367116fddc9f66b4da5b6aaf3af4ee8506b565567e97c40a1dd4a0d76f8f239d24123aa3915b41f86a724"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "c66879b90ee63afff23843e73fd51ff5bce1dee229d364489ca4a92a2ed06064f69fbefefdb384c4c273070c58e5e3aa516e796417f24217df9efeba0906b16e49af2f4dc5e8ab1c2bc03aa88dbda4870afa09a4e1fc65399f660c670ac0e8468ce9097e421c2922a90036e9541a8e8a118222dc380ad57e8e9b235ac3103d2d9d7e52cf96525f7515c50384e49930dd67e34b"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "b0ea3ec308a87640e3d31debd1117d25e204160e45590de5459c13ec8f4c4d9b28dcb88dfe78860c4d009ffcc232842b90d885a0b7f543e4c896022470324c629387b255b53f9d87b02d122ce69a2b88fcaac9f2ca844cd0c4"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "ad73b8c714b85d0a180f58bb4d7bf149706c9fb981066b793d696282c01c"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "663878c2d9bb837d605f731e8c2a8d39441ea91122c49c5af2bfc8430d736b2c77fa57543da4dc14759bd9ff57719960427b3b3e1df3201133863e0b58e2af1ee09c8c55eb2cb663670f5b4d6799fe3e8b98522c884888828f716d1de78b722a96eb20fbd0e9244c4a3555189f0cedda17"}]}, 0x310}, 0x1, 0x0, 0x0, 0x48840}, 0x8080)
ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x6d)
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000002cc0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(digest_null-generic,ctr-cast6-avx)\x00'}, {&(0x7f0000002bc0)=""/172, 0xac}, &(0x7f0000002c80), 0x44}, 0xa0)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x13)

[  440.227787][ T1227] ieee802154 phy0 wpan0: encryption failed: -22
[  440.234413][ T1227] ieee802154 phy1 wpan1: encryption failed: -22
14:13:38 executing program 2:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', <r2=>r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r3, 0x5502)
r5 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0xd)
read$FUSE(r5, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r6}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x24)
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
r8 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r7, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4)
setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10)
getrusage(0xffffffffffffffff, &(0x7f00000026c0))
ioctl$RTC_UIE_ON(r5, 0x7003)
ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x3f)
syz_open_dev$media(&(0x7f0000002780), 0x6, 0x208c0)
sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002b40)={&(0x7f0000002800)={0x310, 0x13, 0x300, 0x70bd28, 0x25dfdbff, {0x11, 0x6, 0x7, 0x20, {0x4e24, 0x4e22, [0x4, 0xffff, 0x8, 0x7], [0x1, 0x10000, 0x2, 0x40], r2, [0xfffffffd, 0x6]}, 0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xec, 0x1, "9019efd9b0becdfc9bf4c114bf49b1f7246aa1727193526e9a1084e6bc4091fb618872348caea970e2e6c0555f3bb6efe4370eceb16321bb59c32e5ee82efa9731248d924342bc9f79112f51f3c4e272f3ac97066c45d8a12a6dfc4b43217d51b7bc1df9c58ab4e49ab5ba349877a5ad0ba949cee6b4f13881524089386ff0ff131cea01759a508894c21ccc822b9bac5eed0f49cfcc7fc1da9d51cb83cedaa97b54bdae19c861e7f309b4476b7c6f9bde29fdd2a38027a5bec295ca3f733ed2a10caab11f32ea30983e49ac207f8617b7a9b3b921c2196911223bd710d6cb18b273e92b2d2c8eec"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "605842af52dc88b7e43f35bc248b0311c35dcd7a622367116fddc9f66b4da5b6aaf3af4ee8506b565567e97c40a1dd4a0d76f8f239d24123aa3915b41f86a724"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "c66879b90ee63afff23843e73fd51ff5bce1dee229d364489ca4a92a2ed06064f69fbefefdb384c4c273070c58e5e3aa516e796417f24217df9efeba0906b16e49af2f4dc5e8ab1c2bc03aa88dbda4870afa09a4e1fc65399f660c670ac0e8468ce9097e421c2922a90036e9541a8e8a118222dc380ad57e8e9b235ac3103d2d9d7e52cf96525f7515c50384e49930dd67e34b"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "b0ea3ec308a87640e3d31debd1117d25e204160e45590de5459c13ec8f4c4d9b28dcb88dfe78860c4d009ffcc232842b90d885a0b7f543e4c896022470324c629387b255b53f9d87b02d122ce69a2b88fcaac9f2ca844cd0c4"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "ad73b8c714b85d0a180f58bb4d7bf149706c9fb981066b793d696282c01c"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "663878c2d9bb837d605f731e8c2a8d39441ea91122c49c5af2bfc8430d736b2c77fa57543da4dc14759bd9ff57719960427b3b3e1df3201133863e0b58e2af1ee09c8c55eb2cb663670f5b4d6799fe3e8b98522c884888828f716d1de78b722a96eb20fbd0e9244c4a3555189f0cedda17"}]}, 0x310}, 0x1, 0x0, 0x0, 0x48840}, 0x8080)
ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x6d)
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000002cc0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(digest_null-generic,ctr-cast6-avx)\x00'}, {&(0x7f0000002bc0)=""/172, 0xac}, &(0x7f0000002c80), 0x44}, 0xa0)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x13)

14:13:38 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:38 executing program 4:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r2 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r3 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r2, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r3, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r2, 0x5502)
r4 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0xd)
read$FUSE(r4, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r5}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r4, 0x4004556b, 0x24)
syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
socket$l2tp6(0xa, 0x2, 0x73)

14:13:38 executing program 5:
ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003)
ioctl$MEDIA_IOC_REQUEST_ALLOC(0xffffffffffffffff, 0x80047c05, &(0x7f0000000000)=<r0=>0xffffffffffffffff)
ioctl$MEDIA_REQUEST_IOC_REINIT(r0, 0x7c81, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'tunl0\x00', <r1=>0x0, 0x700, 0x20, 0x6, 0x2, {{0x45, 0x4, 0x2, 0x0, 0x114, 0x64, 0x0, 0x5, 0x4, 0x0, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1, {[@cipso={0x86, 0xd, 0x1, [{0x2, 0x7, "fe09862a24"}]}, @generic={0x83, 0xe, "0e6b78b4787ec7ba849fe214"}, @cipso={0x86, 0x9, 0xffffffffffffffff, [{0x5, 0x3, '\\'}]}, @lsrr={0x83, 0x1b, 0xb0, [@broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @remote, @dev={0xac, 0x14, 0x14, 0x41}, @multicast2]}, @ra={0x94, 0x4}, @timestamp_prespec={0x44, 0x14, 0x92, 0x3, 0x2, [{@multicast1, 0x1000}, {@private=0xa010101, 0x3}]}, @timestamp={0x44, 0x2c, 0xdc, 0x0, 0x6, [0x1, 0x0, 0x44, 0x7fff, 0xb3, 0x401, 0x5, 0x400, 0x81, 0x514b]}, @timestamp_prespec={0x44, 0x14, 0xea, 0x3, 0x1, [{@dev={0xac, 0x14, 0x14, 0x3c}, 0x6}, {@private=0xa010101}]}, @timestamp_addr={0x44, 0x44, 0x85, 0x1, 0x3, [{@broadcast, 0x8}, {@broadcast, 0x14000000}, {@local, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x8}, {@private=0xa010102}, {@dev={0xac, 0x14, 0x14, 0xa}, 0x7}, {@empty, 0x12d}, {@remote, 0x3}]}, @timestamp_addr={0x44, 0x24, 0x5c, 0x1, 0x8, [{@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3}, {@dev={0xac, 0x14, 0x14, 0x40}, 0xaae4}, {@local, 0x2}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x5}]}]}}}}})
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000200)={'syztnl2\x00', &(0x7f00000001c0)={'syztnl1\x00', <r2=>r1, 0x7800, 0x40, 0xa6d6, 0x2, {{0x5, 0x4, 0x0, 0x6, 0x14, 0x66, 0x0, 0x0, 0x29, 0x0, @loopback, @rand_addr=0x64010100}}}})
ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f0000000240)={0xc, 0xffffffff, {0x57, 0x5, 0x81, {0x2, 0x20}, {0x25, 0x1ff}, @cond=[{0x1, 0xfff, 0x41, 0x4725, 0xffff, 0x6}, {0x3661, 0x7, 0x100, 0x3, 0xe2c, 0x87c}]}, {0x52, 0x3ff, 0x80, {0x8000, 0x1}, {0x6}, @rumble={0x8, 0x2}}})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f00000002c0), 0x200, 0x0)
r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000340), 0xffffffffffffffff)
sendmsg$L2TP_CMD_SESSION_DELETE(r3, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x40, r4, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'wg1\x00'}, @L2TP_ATTR_OFFSET={0x6, 0x3, 0x100}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x100}, @L2TP_ATTR_PW_TYPE={0x6, 0x1, 0x7}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x10)
ioctl$UI_DEV_DESTROY(r3, 0x5502)
r5 = syz_open_dev$vcsu(&(0x7f0000000440), 0x6, 0x2080)
ioctl$UI_SET_PROPBIT(r5, 0x4004556e, 0xd)
read$FUSE(r5, &(0x7f0000000480)={0x2020, 0x0, 0x0, 0x0, 0x0, <r6=>0x0}, 0x2020)
ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0286405, &(0x7f00000024c0)={0x7, 0x3, {r6}, {}, 0x9, 0x3})
ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x24)
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002540), 0xffffffffffffffff)
r8 = socket$l2tp6(0xa, 0x2, 0x73)
sendmsg$L2TP_CMD_NOOP(r5, &(0x7f0000002640)={&(0x7f0000002500)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000002600)={&(0x7f0000002580)={0x44, r7, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_L2SPEC_TYPE={0x5, 0x5, 0xbacbbc01590b2433}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r8}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x2}, @L2TP_ATTR_SEND_SEQ={0x5, 0x13, 0x54}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x3}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5}]}, 0x44}}, 0x4)
setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000002680)={{0x2}, 0x2}, 0x10)
getrusage(0xffffffffffffffff, &(0x7f00000026c0))
ioctl$RTC_UIE_ON(r5, 0x7003)
ioctl$UI_SET_MSCBIT(r3, 0x40045568, 0x3f)
syz_open_dev$media(&(0x7f0000002780), 0x6, 0x208c0)
sendmsg$DCCPDIAG_GETSOCK(0xffffffffffffffff, &(0x7f0000002b80)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002b40)={&(0x7f0000002800)={0x310, 0x13, 0x300, 0x70bd28, 0x25dfdbff, {0x11, 0x6, 0x7, 0x20, {0x4e24, 0x4e22, [0x4, 0xffff, 0x8, 0x7], [0x1, 0x10000, 0x2, 0x40], r2, [0xfffffffd, 0x6]}, 0x9, 0x1}, [@INET_DIAG_REQ_BYTECODE={0xec, 0x1, "9019efd9b0becdfc9bf4c114bf49b1f7246aa1727193526e9a1084e6bc4091fb618872348caea970e2e6c0555f3bb6efe4370eceb16321bb59c32e5ee82efa9731248d924342bc9f79112f51f3c4e272f3ac97066c45d8a12a6dfc4b43217d51b7bc1df9c58ab4e49ab5ba349877a5ad0ba949cee6b4f13881524089386ff0ff131cea01759a508894c21ccc822b9bac5eed0f49cfcc7fc1da9d51cb83cedaa97b54bdae19c861e7f309b4476b7c6f9bde29fdd2a38027a5bec295ca3f733ed2a10caab11f32ea30983e49ac207f8617b7a9b3b921c2196911223bd710d6cb18b273e92b2d2c8eec"}, @INET_DIAG_REQ_BYTECODE={0x44, 0x1, "605842af52dc88b7e43f35bc248b0311c35dcd7a622367116fddc9f66b4da5b6aaf3af4ee8506b565567e97c40a1dd4a0d76f8f239d24123aa3915b41f86a724"}, @INET_DIAG_REQ_BYTECODE={0x97, 0x1, "c66879b90ee63afff23843e73fd51ff5bce1dee229d364489ca4a92a2ed06064f69fbefefdb384c4c273070c58e5e3aa516e796417f24217df9efeba0906b16e49af2f4dc5e8ab1c2bc03aa88dbda4870afa09a4e1fc65399f660c670ac0e8468ce9097e421c2922a90036e9541a8e8a118222dc380ad57e8e9b235ac3103d2d9d7e52cf96525f7515c50384e49930dd67e34b"}, @INET_DIAG_REQ_BYTECODE={0x5d, 0x1, "b0ea3ec308a87640e3d31debd1117d25e204160e45590de5459c13ec8f4c4d9b28dcb88dfe78860c4d009ffcc232842b90d885a0b7f543e4c896022470324c629387b255b53f9d87b02d122ce69a2b88fcaac9f2ca844cd0c4"}, @INET_DIAG_REQ_BYTECODE={0x22, 0x1, "ad73b8c714b85d0a180f58bb4d7bf149706c9fb981066b793d696282c01c"}, @INET_DIAG_REQ_BYTECODE={0x75, 0x1, "663878c2d9bb837d605f731e8c2a8d39441ea91122c49c5af2bfc8430d736b2c77fa57543da4dc14759bd9ff57719960427b3b3e1df3201133863e0b58e2af1ee09c8c55eb2cb663670f5b4d6799fe3e8b98522c884888828f716d1de78b722a96eb20fbd0e9244c4a3555189f0cedda17"}]}, 0x310}, 0x1, 0x0, 0x0, 0x48840}, 0x8080)
ioctl$UI_SET_FFBIT(r5, 0x4004556b, 0x6d)
setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x7, &(0x7f0000002cc0)={@alg={0x26, 'aead\x00', 0x0, 0x0, 'authenc(digest_null-generic,ctr-cast6-avx)\x00'}, {&(0x7f0000002bc0)=""/172, 0xac}, &(0x7f0000002c80), 0x44}, 0xa0)
ioctl$UI_SET_EVBIT(0xffffffffffffffff, 0x40045564, 0x13)
r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000002d80)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0)
ioctl$DRM_IOCTL_MODE_GETRESOURCES(r9, 0xc04064a0, &(0x7f0000002ec0)={&(0x7f0000002dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002e00)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002e40)=[0x0, 0x0, 0x0, 0x0], &(0x7f0000002e80)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x6, 0x4, 0x4, 0x5})

14:13:38 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)=<r11=>0x0)
sendmsg$NFC_CMD_LLC_SDREQ(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x1c, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0)

14:13:38 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:38 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)=<r11=>0x0)
sendmsg$NFC_CMD_LLC_SDREQ(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x1c, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0)

14:13:38 executing program 0:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
r9 = syz_open_dev$vcsu(&(0x7f0000000a40), 0x20000000, 0x88000)
r10 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
ioctl$UI_SET_KEYBIT(r10, 0x40045565, 0x29b)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)
ioctl$UI_SET_MSCBIT(r9, 0x40045568, 0x27)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000b40)=<r11=>0x0)
sendmsg$NFC_CMD_LLC_SDREQ(0xffffffffffffffff, &(0x7f0000000c00)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000bc0)={&(0x7f0000000b80)={0x1c, r7, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r11}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x0)

14:13:38 executing program 4:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:38 executing program 5:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 2:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:39 executing program 4:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 1:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 5:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 0:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 2:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:39 executing program 1:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 1:
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28a00, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x22, 0x19, 0xa, 0x1a, 0x1, 0x4, 0x2, 0xca, 0x1}})
ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={<r1=>0x0})
ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000100)={r1, 0x3, r0, 0x7, 0x80000})
r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r2)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x8, &(0x7f00000001c0)=[{0xbc4, 0x3f, 0xfb, 0x20}, {0xfff8, 0x4, 0x7, 0x80}, {0x1ff, 0x1f, 0x0, 0x7}, {0x8001, 0x1f, 0x4, 0x4}, {0x5, 0x5, 0xfb, 0x3ff}, {0x100, 0x3f, 0x8, 0x2}, {0x6a5, 0xff, 0x9, 0x9}, {0x5, 0x3, 0x5, 0x3}]})
sendmsg$L2TP_CMD_SESSION_DELETE(r0, 0xfffffffffffffffd, 0x0)
ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000240)={0x20, 0x16, 0x6, 0x1b, 0xa, 0x8, 0x2, 0xf9, 0x1})
r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000280), 0x80001, 0x11)
ioctl$UI_END_FF_ERASE(r3, 0x400c55cb, &(0x7f00000002c0)={0x8, 0x400})
r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0)
ioctl$RTC_PLL_GET(r4, 0x80207011, &(0x7f0000000340))
r5 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000380), 0x802, 0x0)
ioctl$UI_SET_PHYS(r5, 0x4008556c, &(0x7f00000003c0)='syz0\x00')
openat$cgroup_pressure(r2, &(0x7f0000000400)='io.pressure\x00', 0x2, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r4, 0xc0182101, &(0x7f0000000440)={r1, 0x8000, 0x9})
r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000480), 0x200041, 0x0)
r7 = openat$null(0xffffffffffffff9c, &(0x7f00000004c0), 0x2, 0x0)
ioctl$UI_GET_SYSNAME(r7, 0x8040552c, &(0x7f0000000500))
write$vhost_msg_v2(0xffffffffffffffff, &(0x7f00000005c0)={0x2, 0x0, {&(0x7f0000000540)=""/6, 0x6, &(0x7f0000000580)=""/17, 0x3, 0x1}}, 0x48)
r8 = openat$cgroup_pressure(r4, &(0x7f0000000640)='io.pressure\x00', 0x2, 0x0)
fstat(r8, &(0x7f0000000680))
ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f0000000700)={0x3, 0xffffffff})
ioctl$RTC_PIE_ON(r6, 0x7005)
ioctl$DRM_IOCTL_MODE_GETPLANE(r3, 0xc02064b6, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000740)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]})
setsockopt$RDS_CONG_MONITOR(r6, 0x114, 0x6, &(0x7f00000007c0)=0x1, 0x4)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000840)=@generic={&(0x7f0000000800)='./file0\x00', 0x0, 0x8}, 0x18)
r9 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000880), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG_SIZE(r9, 0x8004af79, &(0x7f00000008c0))

14:13:39 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:39 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 2:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:39 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:39 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)

14:13:40 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:40 executing program 1:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)

14:13:40 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:40 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)

14:13:40 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)

14:13:40 executing program 1:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:40 executing program 4:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)

14:13:40 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:40 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f0000003740)={&(0x7f0000003600)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000003700)={&(0x7f0000003680)={0x4c, 0x0, 0x100, 0x70bd2b, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0x1}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x2400c811)

14:13:40 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)

14:13:40 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x3c, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:40 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 1)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:40 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)

14:13:40 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)
setsockopt$IPT_SO_SET_REPLACE(r6, 0x0, 0x40, &(0x7f00000030c0)=@security={'security\x00', 0xe, 0x4, 0x4e0, 0xffffffff, 0x250, 0x0, 0x0, 0xffffffff, 0xffffffff, 0x448, 0x448, 0x448, 0xffffffff, 0x4, &(0x7f0000003080), {[{{@uncond, 0x0, 0xf0, 0x150, 0x0, {}, [@common=@addrtype={{0x30}, {0x4c, 0x200, 0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x3, [0x4e20, 0x20, 0x4e20, 0x4e24, 0x4e23, 0x4e23, 0x4e24, 0x4e20, 0x4e22, 0x4e21, 0x4e21, 0x4e21, 0x4e20, 0x4e20, 0x4e20], [0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1]}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0xffffffffffffffff, [0x2, 0x5, 0x0, 0x4, 0x0, 0x4], 0x6, 0x8}, {0x3, [0x2, 0x4, 0x4, 0x2, 0x6, 0x5], 0x3, 0x1}}}}, {{@ip={@multicast1, @empty, 0xffffffff, 0xff000000, 'syz_tun\x00', 'batadv_slave_0\x00', {0xff}, {}, 0x0, 0x1, 0x2}, 0x0, 0xa0, 0x100, 0x0, {}, [@common=@ah={{0x30}, {[0x5, 0x6]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x5, @remote, 0x8, 0xd, [0x21, 0x32, 0x17, 0x21, 0x1d, 0x7, 0x3b, 0x4, 0x22, 0x6, 0x2b, 0xf, 0x1c, 0x7, 0x22, 0x4], 0x1, 0x3, 0x40}}}, {{@ip={@dev={0xac, 0x14, 0x14, 0x2d}, @multicast1, 0xffffff00, 0xff, 'bridge_slave_0\x00', 'caif0\x00', {0xff}, {}, 0x89, 0x1}, 0x0, 0x198, 0x1f8, 0x0, {}, [@common=@socket0={{0x20}}, @common=@inet=@recent1={{0x108}, {0x7, 0x180, 0x20, 0x1, 'syz0\x00', 0x8, [0xff, 0xff, 0x0, 0xffffffff]}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x1, @multicast, 0x4, 0x7, [0x35, 0x26, 0x2e, 0x25, 0x7, 0x9, 0xf, 0x29, 0x36, 0x28, 0x8, 0x3f, 0x8, 0x2b, 0xf, 0x1c], 0x2, 0x200, 0xffff}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540)

[  442.884016][ T1674] FAULT_INJECTION: forcing a failure.
[  442.884016][ T1674] name failslab, interval 1, probability 0, space 0, times 1
[  442.919278][ T1674] CPU: 1 PID: 1674 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
14:13:40 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

[  442.929648][ T1674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  442.939734][ T1674] Call Trace:
[  442.943041][ T1674]  <TASK>
[  442.945992][ T1674]  dump_stack_lvl+0x125/0x1b0
[  442.950836][ T1674]  should_fail_ex+0x496/0x5b0
[  442.955586][ T1674]  should_failslab+0x9/0x20
[  442.960158][ T1674]  kmem_cache_alloc+0x61/0x400
[  442.964973][ T1674]  getname_flags.part.0+0x50/0x4d0
[  442.970152][ T1674]  getname+0x90/0xe0
[  442.974077][ T1674]  do_sys_openat2+0x100/0x1e0
[  442.978790][ T1674]  ? build_open_flags+0x690/0x690
[  442.983860][ T1674]  __x64_sys_openat+0x175/0x210
[  442.988749][ T1674]  ? __ia32_sys_open+0x1e0/0x1e0
[  442.993720][ T1674]  ? ksys_write+0x1a7/0x250
[  442.998257][ T1674]  ? rcu_is_watching+0x12/0xb0
[  443.003072][ T1674]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  443.009108][ T1674]  do_syscall_64+0x38/0xb0
[  443.013585][ T1674]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  443.019579][ T1674] RIP: 0033:0x7f894267cae9
14:13:40 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)

[  443.024016][ T1674] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  443.043653][ T1674] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  443.052096][ T1674] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  443.060091][ T1674] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  443.068087][ T1674] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  443.076083][ T1674] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  443.084072][ T1674] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  443.092067][ T1674]  </TASK>
14:13:41 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 1)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:41 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 2)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:41 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)
ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001)

14:13:41 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)

[  443.188313][ T1689] FAULT_INJECTION: forcing a failure.
[  443.188313][ T1689] name failslab, interval 1, probability 0, space 0, times 0
[  443.202413][ T1689] CPU: 1 PID: 1689 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  443.212788][ T1689] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  443.222863][ T1689] Call Trace:
[  443.226159][ T1689]  <TASK>
[  443.229104][ T1689]  dump_stack_lvl+0x125/0x1b0
[  443.233834][ T1689]  should_fail_ex+0x496/0x5b0
14:13:41 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)

[  443.238546][ T1689]  should_failslab+0x9/0x20
[  443.243095][ T1689]  kmem_cache_alloc+0x61/0x400
[  443.247896][ T1689]  getname_flags.part.0+0x50/0x4d0
[  443.253057][ T1689]  getname+0x90/0xe0
[  443.256985][ T1689]  do_sys_openat2+0x100/0x1e0
[  443.261703][ T1689]  ? build_open_flags+0x690/0x690
[  443.266770][ T1689]  __x64_sys_openat+0x175/0x210
[  443.271661][ T1689]  ? __ia32_sys_open+0x1e0/0x1e0
[  443.276632][ T1689]  ? ksys_write+0x1a7/0x250
[  443.281156][ T1689]  ? rcu_is_watching+0x12/0xb0
[  443.285927][ T1689]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  443.291916][ T1689]  do_syscall_64+0x38/0xb0
[  443.296335][ T1689]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  443.302237][ T1689] RIP: 0033:0x7fc16a87cae9
[  443.306652][ T1689] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  443.326275][ T1689] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  443.334698][ T1689] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9
[  443.342675][ T1689] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  443.350650][ T1689] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000
[  443.358623][ T1689] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  443.366596][ T1689] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168
[  443.374575][ T1689]  </TASK>
[  443.427962][ T1696] FAULT_INJECTION: forcing a failure.
[  443.427962][ T1696] name fail_usercopy, interval 1, probability 0, space 0, times 1
[  443.446644][ T1696] CPU: 0 PID: 1696 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  443.457087][ T1696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  443.467165][ T1696] Call Trace:
[  443.470461][ T1696]  <TASK>
[  443.473410][ T1696]  dump_stack_lvl+0x125/0x1b0
[  443.478140][ T1696]  should_fail_ex+0x496/0x5b0
[  443.482860][ T1696]  strncpy_from_user+0x38/0x300
[  443.487754][ T1696]  getname_flags.part.0+0x93/0x4d0
[  443.492912][ T1696]  getname+0x90/0xe0
[  443.496832][ T1696]  do_sys_openat2+0x100/0x1e0
[  443.501542][ T1696]  ? build_open_flags+0x690/0x690
[  443.506608][ T1696]  __x64_sys_openat+0x175/0x210
[  443.511493][ T1696]  ? __ia32_sys_open+0x1e0/0x1e0
[  443.516464][ T1696]  ? ksys_write+0x1a7/0x250
[  443.521005][ T1696]  ? rcu_is_watching+0x12/0xb0
[  443.525799][ T1696]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  443.531816][ T1696]  do_syscall_64+0x38/0xb0
[  443.536263][ T1696]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  443.542186][ T1696] RIP: 0033:0x7f894267cae9
[  443.546621][ T1696] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  443.566254][ T1696] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  443.574679][ T1696] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  443.582656][ T1696] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  443.590631][ T1696] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  443.598603][ T1696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  443.606578][ T1696] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  443.614557][ T1696]  </TASK>
14:13:41 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000003040)={0x3}, 0x8)

14:13:41 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:41 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)

14:13:41 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 2)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:41 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)

14:13:41 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
r9 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)
sendmsg$nl_route(r9, &(0x7f0000003000)={&(0x7f0000002f40)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002f80)=@delnexthop={0x40, 0x69, 0x2, 0x70bd26, 0x25dfdbfd, {}, [{0x8, 0x1, 0x2}, {0x8, 0x1, 0x1}, {0x8, 0x1, 0x2}, {0x8, 0x1, 0x2}, {0x8}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x81)

14:13:41 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 3)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:41 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:41 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)

14:13:41 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)

14:13:41 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000002f00), 0x4000, 0x0)

14:13:41 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 3)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

[  444.024737][ T1729] FAULT_INJECTION: forcing a failure.
[  444.024737][ T1729] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  444.037912][ T1729] CPU: 1 PID: 1729 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  444.048263][ T1729] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  444.058323][ T1729] Call Trace:
[  444.061605][ T1729]  <TASK>
[  444.064536][ T1729]  dump_stack_lvl+0x125/0x1b0
[  444.069246][ T1729]  should_fail_ex+0x496/0x5b0
[  444.073931][ T1729]  strncpy_from_user+0x38/0x300
[  444.078791][ T1729]  getname_flags.part.0+0x93/0x4d0
[  444.083920][ T1729]  getname+0x90/0xe0
[  444.087817][ T1729]  do_sys_openat2+0x100/0x1e0
[  444.092503][ T1729]  ? build_open_flags+0x690/0x690
[  444.097539][ T1729]  __x64_sys_openat+0x175/0x210
[  444.102398][ T1729]  ? __ia32_sys_open+0x1e0/0x1e0
[  444.107343][ T1729]  ? ksys_write+0x1a7/0x250
[  444.111858][ T1729]  ? rcu_is_watching+0x12/0xb0
[  444.116627][ T1729]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  444.122618][ T1729]  do_syscall_64+0x38/0xb0
[  444.127040][ T1729]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  444.132968][ T1729] RIP: 0033:0x7f894267cae9
[  444.137385][ T1729] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  444.157002][ T1729] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  444.165428][ T1729] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
14:13:42 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)

[  444.173406][ T1729] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  444.181381][ T1729] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  444.189353][ T1729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  444.197326][ T1729] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  444.205306][ T1729]  </TASK>
14:13:42 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)

14:13:42 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)
write$vhost_msg_v2(r6, &(0x7f0000002e80)={0x2, 0x0, {&(0x7f0000001dc0)=""/174, 0xae, &(0x7f0000001e80)=""/4096, 0x1, 0x2}}, 0x48)

[  444.273963][ T1736] FAULT_INJECTION: forcing a failure.
[  444.273963][ T1736] name failslab, interval 1, probability 0, space 0, times 0
14:13:42 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

[  444.350710][ T1736] CPU: 0 PID: 1736 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  444.361086][ T1736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  444.371162][ T1736] Call Trace:
[  444.374457][ T1736]  <TASK>
[  444.377400][ T1736]  dump_stack_lvl+0x125/0x1b0
[  444.382129][ T1736]  should_fail_ex+0x496/0x5b0
[  444.386841][ T1736]  should_failslab+0x9/0x20
[  444.391393][ T1736]  kmem_cache_alloc+0x61/0x400
[  444.396187][ T1736]  ? _parse_integer_limit+0x17f/0x1d0
[  444.401639][ T1736]  alloc_empty_file+0x73/0x1d0
[  444.406453][ T1736]  path_openat+0xdc/0x29c0
[  444.410919][ T1736]  ? __x64_sys_openat+0x175/0x210
[  444.415982][ T1736]  ? do_syscall_64+0x38/0xb0
[  444.420609][ T1736]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  444.426713][ T1736]  ? path_lookupat+0x770/0x770
[  444.431529][ T1736]  do_filp_open+0x1de/0x430
[  444.436063][ T1736]  ? may_open_dev+0xf0/0xf0
[  444.440595][ T1736]  ? expand_files+0x442/0x910
[  444.445324][ T1736]  ? _raw_spin_unlock+0x28/0x40
[  444.450287][ T1736]  ? alloc_fd+0x2da/0x6c0
[  444.454657][ T1736]  do_sys_openat2+0x176/0x1e0
[  444.459368][ T1736]  ? build_open_flags+0x690/0x690
[  444.464436][ T1736]  __x64_sys_openat+0x175/0x210
[  444.469319][ T1736]  ? __ia32_sys_open+0x1e0/0x1e0
[  444.474291][ T1736]  ? ksys_write+0x1a7/0x250
[  444.478836][ T1736]  ? rcu_is_watching+0x12/0xb0
[  444.483631][ T1736]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  444.489651][ T1736]  do_syscall_64+0x38/0xb0
[  444.494096][ T1736]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  444.500023][ T1736] RIP: 0033:0x7fc16a87cae9
[  444.504459][ T1736] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  444.524108][ T1736] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  444.532557][ T1736] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9
[  444.540560][ T1736] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
14:13:42 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)

[  444.548562][ T1736] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000
[  444.556562][ T1736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  444.564556][ T1736] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168
[  444.572559][ T1736]  </TASK>
14:13:42 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 4)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:42 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})

[  444.666870][ T1755] FAULT_INJECTION: forcing a failure.
[  444.666870][ T1755] name failslab, interval 1, probability 0, space 0, times 0
[  444.679579][ T1755] CPU: 0 PID: 1755 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  444.689934][ T1755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  444.700010][ T1755] Call Trace:
[  444.703302][ T1755]  <TASK>
[  444.706247][ T1755]  dump_stack_lvl+0x125/0x1b0
[  444.710979][ T1755]  should_fail_ex+0x496/0x5b0
[  444.715696][ T1755]  should_failslab+0x9/0x20
[  444.720242][ T1755]  kmem_cache_alloc+0x61/0x400
[  444.725037][ T1755]  ? _parse_integer_limit+0x17f/0x1d0
[  444.730462][ T1755]  alloc_empty_file+0x73/0x1d0
[  444.735277][ T1755]  path_openat+0xdc/0x29c0
[  444.739741][ T1755]  ? __x64_sys_openat+0x175/0x210
[  444.744805][ T1755]  ? do_syscall_64+0x38/0xb0
[  444.749423][ T1755]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  444.755528][ T1755]  ? path_lookupat+0x770/0x770
[  444.760344][ T1755]  do_filp_open+0x1de/0x430
[  444.764878][ T1755]  ? may_open_dev+0xf0/0xf0
[  444.769411][ T1755]  ? expand_files+0x442/0x910
[  444.774133][ T1755]  ? _raw_spin_unlock+0x28/0x40
[  444.779025][ T1755]  ? alloc_fd+0x2da/0x6c0
[  444.783394][ T1755]  do_sys_openat2+0x176/0x1e0
[  444.788101][ T1755]  ? build_open_flags+0x690/0x690
[  444.793168][ T1755]  __x64_sys_openat+0x175/0x210
[  444.798062][ T1755]  ? __ia32_sys_open+0x1e0/0x1e0
[  444.803036][ T1755]  ? ksys_write+0x1a7/0x250
[  444.807584][ T1755]  ? rcu_is_watching+0x12/0xb0
[  444.812371][ T1755]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  444.818390][ T1755]  do_syscall_64+0x38/0xb0
[  444.822837][ T1755]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  444.828765][ T1755] RIP: 0033:0x7f894267cae9
[  444.833204][ T1755] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  444.852868][ T1755] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  444.861311][ T1755] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  444.869303][ T1755] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  444.877291][ T1755] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  444.885291][ T1755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  444.893280][ T1755] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  444.901281][ T1755]  </TASK>
14:13:42 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)
socket$rds(0x15, 0x5, 0x0)

14:13:42 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)

14:13:42 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 5)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:42 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 4)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:42 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:42 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40))

[  445.076034][ T1764] FAULT_INJECTION: forcing a failure.
[  445.076034][ T1764] name failslab, interval 1, probability 0, space 0, times 0
[  445.110204][ T1764] CPU: 1 PID: 1764 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
14:13:43 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)

[  445.120571][ T1764] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  445.130651][ T1764] Call Trace:
[  445.133950][ T1764]  <TASK>
[  445.136896][ T1764]  dump_stack_lvl+0x125/0x1b0
[  445.141619][ T1764]  should_fail_ex+0x496/0x5b0
[  445.146329][ T1764]  should_failslab+0x9/0x20
[  445.150878][ T1764]  kmem_cache_alloc+0x61/0x400
[  445.155673][ T1764]  security_file_alloc+0x41/0x250
[  445.160771][ T1764]  init_file+0xb9/0x2d0
[  445.164972][ T1764]  alloc_empty_file+0x91/0x1d0
[  445.169783][ T1764]  path_openat+0xdc/0x29c0
[  445.174256][ T1764]  ? __x64_sys_openat+0x175/0x210
[  445.179316][ T1764]  ? do_syscall_64+0x38/0xb0
[  445.183936][ T1764]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  445.190039][ T1764]  ? path_lookupat+0x770/0x770
[  445.194848][ T1764]  do_filp_open+0x1de/0x430
[  445.199379][ T1764]  ? may_open_dev+0xf0/0xf0
[  445.203908][ T1764]  ? expand_files+0x442/0x910
[  445.208627][ T1764]  ? _raw_spin_unlock+0x28/0x40
[  445.213519][ T1764]  ? alloc_fd+0x2da/0x6c0
[  445.217888][ T1764]  do_sys_openat2+0x176/0x1e0
[  445.222604][ T1764]  ? build_open_flags+0x690/0x690
[  445.226920][ T1772] FAULT_INJECTION: forcing a failure.
[  445.226920][ T1772] name failslab, interval 1, probability 0, space 0, times 0
[  445.227645][ T1764]  __x64_sys_openat+0x175/0x210
[  445.245099][ T1764]  ? __ia32_sys_open+0x1e0/0x1e0
[  445.250068][ T1764]  ? ksys_write+0x1a7/0x250
[  445.254609][ T1764]  ? rcu_is_watching+0x12/0xb0
[  445.259401][ T1764]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  445.265418][ T1764]  do_syscall_64+0x38/0xb0
[  445.269866][ T1764]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  445.275804][ T1764] RIP: 0033:0x7f894267cae9
[  445.280244][ T1764] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  445.299878][ T1764] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  445.308325][ T1764] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  445.316327][ T1764] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  445.324321][ T1764] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  445.332316][ T1764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  445.340309][ T1764] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  445.348308][ T1764]  </TASK>
[  445.373422][ T1772] CPU: 1 PID: 1772 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  445.383798][ T1772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  445.393874][ T1772] Call Trace:
[  445.397189][ T1772]  <TASK>
[  445.400138][ T1772]  dump_stack_lvl+0x125/0x1b0
[  445.404867][ T1772]  should_fail_ex+0x496/0x5b0
[  445.409579][ T1772]  should_failslab+0x9/0x20
[  445.414123][ T1772]  kmem_cache_alloc+0x61/0x400
[  445.418903][ T1772]  security_file_alloc+0x41/0x250
[  445.423953][ T1772]  init_file+0xb9/0x2d0
[  445.428128][ T1772]  alloc_empty_file+0x91/0x1d0
[  445.432912][ T1772]  path_openat+0xdc/0x29c0
[  445.437349][ T1772]  ? __x64_sys_openat+0x175/0x210
[  445.442380][ T1772]  ? do_syscall_64+0x38/0xb0
[  445.446972][ T1772]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  445.453062][ T1772]  ? path_lookupat+0x770/0x770
[  445.457846][ T1772]  do_filp_open+0x1de/0x430
[  445.462356][ T1772]  ? may_open_dev+0xf0/0xf0
[  445.466863][ T1772]  ? expand_files+0x442/0x910
[  445.471560][ T1772]  ? _raw_spin_unlock+0x28/0x40
[  445.476430][ T1772]  ? alloc_fd+0x2da/0x6c0
[  445.480778][ T1772]  do_sys_openat2+0x176/0x1e0
[  445.485470][ T1772]  ? build_open_flags+0x690/0x690
[  445.490519][ T1772]  __x64_sys_openat+0x175/0x210
[  445.495387][ T1772]  ? __ia32_sys_open+0x1e0/0x1e0
[  445.500349][ T1772]  ? ksys_write+0x1a7/0x250
[  445.504876][ T1772]  ? rcu_is_watching+0x12/0xb0
[  445.509648][ T1772]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  445.515642][ T1772]  do_syscall_64+0x38/0xb0
[  445.520072][ T1772]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  445.525974][ T1772] RIP: 0033:0x7fc16a87cae9
[  445.530396][ T1772] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  445.550015][ T1772] RSP: 002b:00007fc16b5d20c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  445.558436][ T1772] RAX: ffffffffffffffda RBX: 00007fc16a99c120 RCX: 00007fc16a87cae9
[  445.566426][ T1772] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
14:13:43 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)
write$vhost_msg(r4, &(0x7f0000001d40)={0x1, {&(0x7f0000000c80)=""/4096, 0x1000, &(0x7f0000001c80)=""/176, 0x0, 0x4}}, 0x48)

[  445.574407][ T1772] RBP: 00007fc16b5d2120 R08: 0000000000000000 R09: 0000000000000000
[  445.582383][ T1772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  445.590358][ T1772] R13: 000000000000006e R14: 00007fc16a99c120 R15: 00007ffec7baa168
[  445.598339][ T1772]  </TASK>
14:13:43 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})

14:13:43 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 6)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:43 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40))

14:13:43 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 5)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:43 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c40)=@o_path={&(0x7f0000000c00)='./file0\x00', 0x0, 0x8, r6}, 0x18)

14:13:43 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:43 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40))

[  445.890486][ T1790] FAULT_INJECTION: forcing a failure.
[  445.890486][ T1790] name failslab, interval 1, probability 0, space 0, times 0
14:13:43 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)

[  445.932678][ T1796] FAULT_INJECTION: forcing a failure.
[  445.932678][ T1796] name failslab, interval 1, probability 0, space 0, times 0
[  445.953623][ T1790] CPU: 1 PID: 1790 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  445.964000][ T1790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  445.974073][ T1790] Call Trace:
[  445.977373][ T1790]  <TASK>
[  445.980320][ T1790]  dump_stack_lvl+0x125/0x1b0
[  445.985046][ T1790]  should_fail_ex+0x496/0x5b0
[  445.989770][ T1790]  should_failslab+0x9/0x20
[  445.994315][ T1790]  __kmem_cache_alloc_node+0x5f/0x470
[  445.999719][ T1790]  ? tomoyo_encode2+0x100/0x3d0
[  446.004605][ T1790]  __kmalloc+0x4f/0x100
[  446.008804][ T1790]  tomoyo_encode2+0x100/0x3d0
[  446.013518][ T1790]  ? rcu_is_watching+0x12/0xb0
[  446.018310][ T1790]  tomoyo_encode+0x29/0x50
[  446.022763][ T1790]  tomoyo_realpath_from_path+0x196/0x710
[  446.028429][ T1790]  tomoyo_check_open_permission+0x2aa/0x3b0
[  446.034358][ T1790]  ? tomoyo_path_number_perm+0x590/0x590
[  446.040024][ T1790]  ? rcu_is_watching+0x12/0xb0
[  446.044814][ T1790]  ? lock_release+0x4bf/0x680
[  446.049559][ T1790]  ? selinux_inode_permission+0xe2/0x5f0
[  446.055236][ T1790]  ? hook_path_mknod+0x670/0x670
[  446.060196][ T1790]  ? reacquire_held_locks+0x4b0/0x4b0
[  446.065608][ T1790]  ? spin_bug+0x1d0/0x1d0
[  446.069998][ T1790]  ? make_vfsgid+0x108/0x160
[  446.074632][ T1790]  tomoyo_file_open+0xa8/0xd0
[  446.079348][ T1790]  security_file_open+0x6a/0xe0
[  446.084208][ T1790]  do_dentry_open+0x538/0x1730
[  446.088985][ T1790]  ? may_open+0x1f2/0x400
[  446.093341][ T1790]  path_openat+0x19af/0x29c0
[  446.097975][ T1790]  ? path_lookupat+0x770/0x770
[  446.102765][ T1790]  do_filp_open+0x1de/0x430
[  446.107274][ T1790]  ? may_open_dev+0xf0/0xf0
[  446.111780][ T1790]  ? expand_files+0x442/0x910
[  446.116475][ T1790]  ? _raw_spin_unlock+0x28/0x40
[  446.121343][ T1790]  ? alloc_fd+0x2da/0x6c0
[  446.125684][ T1790]  do_sys_openat2+0x176/0x1e0
[  446.130372][ T1790]  ? build_open_flags+0x690/0x690
[  446.135410][ T1790]  __x64_sys_openat+0x175/0x210
[  446.140270][ T1790]  ? __ia32_sys_open+0x1e0/0x1e0
[  446.145216][ T1790]  ? ksys_write+0x1a7/0x250
[  446.149737][ T1790]  ? rcu_is_watching+0x12/0xb0
[  446.154507][ T1790]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  446.160502][ T1790]  do_syscall_64+0x38/0xb0
[  446.164925][ T1790]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  446.170834][ T1790] RIP: 0033:0x7f894267cae9
[  446.175251][ T1790] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  446.194867][ T1790] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  446.203296][ T1790] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  446.211271][ T1790] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  446.219246][ T1790] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  446.227220][ T1790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  446.235191][ T1790] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  446.243172][ T1790]  </TASK>
[  446.249202][ T1796] CPU: 0 PID: 1796 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  446.259570][ T1796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  446.269643][ T1796] Call Trace:
[  446.272940][ T1796]  <TASK>
[  446.275884][ T1796]  dump_stack_lvl+0x125/0x1b0
[  446.280589][ T1796]  should_fail_ex+0x496/0x5b0
[  446.285275][ T1796]  should_failslab+0x9/0x20
[  446.289795][ T1796]  kmem_cache_alloc+0x61/0x400
[  446.294571][ T1796]  security_file_alloc+0x41/0x250
[  446.299623][ T1796]  init_file+0xb9/0x2d0
[  446.303802][ T1796]  alloc_empty_file+0x91/0x1d0
[  446.308597][ T1796]  path_openat+0xdc/0x29c0
[  446.313033][ T1796]  ? __x64_sys_openat+0x175/0x210
[  446.318066][ T1796]  ? do_syscall_64+0x38/0xb0
[  446.322659][ T1796]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  446.328752][ T1796]  ? path_lookupat+0x770/0x770
[  446.333550][ T1796]  do_filp_open+0x1de/0x430
[  446.338064][ T1796]  ? may_open_dev+0xf0/0xf0
[  446.342575][ T1796]  ? expand_files+0x442/0x910
[  446.347273][ T1796]  ? _raw_spin_unlock+0x28/0x40
[  446.352147][ T1796]  ? alloc_fd+0x2da/0x6c0
[  446.356496][ T1796]  do_sys_openat2+0x176/0x1e0
[  446.361185][ T1796]  ? build_open_flags+0x690/0x690
[  446.366222][ T1796]  __x64_sys_openat+0x175/0x210
[  446.371084][ T1796]  ? __ia32_sys_open+0x1e0/0x1e0
[  446.376031][ T1796]  ? ksys_write+0x1a7/0x250
[  446.380548][ T1796]  ? rcu_is_watching+0x12/0xb0
[  446.385326][ T1796]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  446.391318][ T1796]  do_syscall_64+0x38/0xb0
[  446.395743][ T1796]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  446.401647][ T1796] RIP: 0033:0x7fc16a87cae9
[  446.406074][ T1796] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  446.425690][ T1796] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  446.434112][ T1796] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9
[  446.442086][ T1796] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  446.450063][ T1796] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000
[  446.458054][ T1796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  446.466038][ T1796] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168
[  446.474019][ T1796]  </TASK>
14:13:44 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:44 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, <r8=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r3, 0xc0286405, &(0x7f0000000bc0)={0xbae, 0x8000, {}, {r8}, 0x90, 0x80})

14:13:44 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)

14:13:44 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:44 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 6)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

[  446.650833][ T1790] ERROR: Out of memory at tomoyo_realpath_from_path.
14:13:44 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 7)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:44 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:44 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

[  446.861907][ T1820] FAULT_INJECTION: forcing a failure.
[  446.861907][ T1820] name failslab, interval 1, probability 0, space 0, times 0
[  446.891557][ T1820] CPU: 0 PID: 1820 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  446.901934][ T1820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  446.912007][ T1820] Call Trace:
[  446.915302][ T1820]  <TASK>
[  446.918251][ T1820]  dump_stack_lvl+0x125/0x1b0
[  446.922982][ T1820]  should_fail_ex+0x496/0x5b0
[  446.927698][ T1820]  should_failslab+0x9/0x20
[  446.932242][ T1820]  __kmem_cache_alloc_node+0x5f/0x470
[  446.937651][ T1820]  ? tomoyo_encode2+0x100/0x3d0
[  446.942542][ T1820]  __kmalloc+0x4f/0x100
[  446.946736][ T1820]  tomoyo_encode2+0x100/0x3d0
[  446.951435][ T1820]  ? rcu_is_watching+0x12/0xb0
[  446.956204][ T1820]  tomoyo_encode+0x29/0x50
[  446.960629][ T1820]  tomoyo_realpath_from_path+0x196/0x710
[  446.966275][ T1820]  tomoyo_check_open_permission+0x2aa/0x3b0
[  446.972180][ T1820]  ? tomoyo_path_number_perm+0x590/0x590
[  446.977820][ T1820]  ? rcu_is_watching+0x12/0xb0
[  446.982593][ T1820]  ? lock_release+0x4bf/0x680
[  446.987289][ T1820]  ? selinux_inode_permission+0xe2/0x5f0
[  446.992942][ T1820]  ? hook_path_mknod+0x670/0x670
[  446.997885][ T1820]  ? reacquire_held_locks+0x4b0/0x4b0
[  447.003278][ T1820]  ? spin_bug+0x1d0/0x1d0
[  447.007623][ T1820]  ? make_vfsgid+0x108/0x160
[  447.012229][ T1820]  tomoyo_file_open+0xa8/0xd0
[  447.016925][ T1820]  security_file_open+0x6a/0xe0
[  447.021785][ T1820]  do_dentry_open+0x538/0x1730
[  447.026558][ T1820]  ? may_open+0x1f2/0x400
[  447.030909][ T1820]  path_openat+0x19af/0x29c0
[  447.035526][ T1820]  ? path_lookupat+0x770/0x770
[  447.040313][ T1820]  do_filp_open+0x1de/0x430
[  447.044825][ T1820]  ? may_open_dev+0xf0/0xf0
[  447.049333][ T1820]  ? expand_files+0x442/0x910
[  447.054027][ T1820]  ? _raw_spin_unlock+0x28/0x40
[  447.058896][ T1820]  ? alloc_fd+0x2da/0x6c0
[  447.063239][ T1820]  do_sys_openat2+0x176/0x1e0
[  447.067929][ T1820]  ? build_open_flags+0x690/0x690
[  447.072965][ T1820]  __x64_sys_openat+0x175/0x210
[  447.077825][ T1820]  ? __ia32_sys_open+0x1e0/0x1e0
[  447.082775][ T1820]  ? ksys_write+0x1a7/0x250
[  447.087292][ T1820]  ? rcu_is_watching+0x12/0xb0
[  447.092060][ T1820]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  447.098054][ T1820]  do_syscall_64+0x38/0xb0
[  447.102478][ T1820]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  447.108381][ T1820] RIP: 0033:0x7fc16a87cae9
[  447.112804][ T1820] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  447.132421][ T1820] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  447.140843][ T1820] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9
[  447.148818][ T1820] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  447.156792][ T1820] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000
[  447.164765][ T1820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  447.172737][ T1820] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168
[  447.180715][ T1820]  </TASK>
14:13:45 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)
fstat(0xffffffffffffffff, &(0x7f0000000b40))

14:13:45 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:45 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})

14:13:45 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

[  447.273597][ T1820] ERROR: Out of memory at tomoyo_realpath_from_path.
14:13:45 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 8)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:45 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r4, &(0x7f0000000b00)={&(0x7f0000000a00), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r7, 0x400, 0x70bd2c, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000004}, 0x880)

14:13:45 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:45 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)

14:13:45 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 7)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

[  447.436041][ T1853] FAULT_INJECTION: forcing a failure.
[  447.436041][ T1853] name failslab, interval 1, probability 0, space 0, times 0
[  447.496461][ T1853] CPU: 1 PID: 1853 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  447.506842][ T1853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  447.516929][ T1853] Call Trace:
[  447.520229][ T1853]  <TASK>
[  447.523179][ T1853]  dump_stack_lvl+0x125/0x1b0
[  447.527909][ T1853]  should_fail_ex+0x496/0x5b0
[  447.532631][ T1853]  should_failslab+0x9/0x20
[  447.537181][ T1853]  __kmem_cache_alloc_node+0x5f/0x470
[  447.542589][ T1853]  kmalloc_trace+0x25/0xe0
[  447.547045][ T1853]  nci_allocate_device+0x105/0x430
[  447.552305][ T1853]  virtual_ncidev_open+0x6f/0x220
[  447.557431][ T1853]  ? virtual_ncidev_read+0x4e0/0x4e0
[  447.562747][ T1853]  misc_open+0x3da/0x4c0
[  447.567049][ T1853]  ? misc_devnode+0x120/0x120
[  447.571762][ T1853]  chrdev_open+0x277/0x700
[  447.576195][ T1853]  ? __unregister_chrdev+0x100/0x100
[  447.581487][ T1853]  ? fsnotify_perm.part.0+0x25d/0x630
[  447.586905][ T1853]  ? fsnotify_perm.part.0+0x268/0x630
[  447.592303][ T1853]  do_dentry_open+0x88b/0x1730
[  447.597096][ T1853]  ? __unregister_chrdev+0x100/0x100
[  447.602402][ T1853]  ? may_open+0x1f2/0x400
[  447.606760][ T1853]  path_openat+0x19af/0x29c0
[  447.611380][ T1853]  ? path_lookupat+0x770/0x770
[  447.616167][ T1853]  do_filp_open+0x1de/0x430
[  447.620679][ T1853]  ? may_open_dev+0xf0/0xf0
[  447.625186][ T1853]  ? expand_files+0x442/0x910
[  447.629884][ T1853]  ? _raw_spin_unlock+0x28/0x40
[  447.634764][ T1853]  ? alloc_fd+0x2da/0x6c0
[  447.639104][ T1853]  do_sys_openat2+0x176/0x1e0
[  447.643790][ T1853]  ? build_open_flags+0x690/0x690
[  447.648831][ T1853]  __x64_sys_openat+0x175/0x210
[  447.653699][ T1853]  ? __ia32_sys_open+0x1e0/0x1e0
[  447.658645][ T1853]  ? ksys_write+0x1a7/0x250
[  447.663173][ T1853]  ? rcu_is_watching+0x12/0xb0
[  447.667948][ T1853]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  447.673941][ T1853]  do_syscall_64+0x38/0xb0
[  447.678366][ T1853]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  447.684276][ T1853] RIP: 0033:0x7f894267cae9
[  447.688696][ T1853] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  447.708316][ T1853] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  447.716745][ T1853] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  447.724723][ T1853] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  447.732700][ T1853] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  447.740677][ T1853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  447.748652][ T1853] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  447.756631][ T1853]  </TASK>
14:13:45 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(0xffffffffffffffff, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:45 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)

14:13:45 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 9)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:45 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:45 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r4, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:46 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 8)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:46 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, 0x0)
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

[  448.237988][ T1884] FAULT_INJECTION: forcing a failure.
[  448.237988][ T1884] name failslab, interval 1, probability 0, space 0, times 0
[  448.285283][ T1884] CPU: 0 PID: 1884 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  448.295667][ T1884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  448.305747][ T1884] Call Trace:
[  448.309048][ T1884]  <TASK>
[  448.312003][ T1884]  dump_stack_lvl+0x125/0x1b0
[  448.316731][ T1884]  should_fail_ex+0x496/0x5b0
[  448.321451][ T1884]  should_failslab+0x9/0x20
[  448.326014][ T1884]  __kmem_cache_alloc_node+0x5f/0x470
[  448.331427][ T1884]  kmalloc_trace+0x25/0xe0
[  448.335890][ T1884]  nci_allocate_device+0x105/0x430
[  448.341047][ T1884]  virtual_ncidev_open+0x6f/0x220
[  448.346105][ T1884]  ? virtual_ncidev_read+0x4e0/0x4e0
[  448.351429][ T1884]  misc_open+0x3da/0x4c0
[  448.355708][ T1884]  ? misc_devnode+0x120/0x120
[  448.360432][ T1884]  chrdev_open+0x277/0x700
[  448.364884][ T1884]  ? __unregister_chrdev+0x100/0x100
[  448.370206][ T1884]  ? fsnotify_perm.part.0+0x25d/0x630
[  448.375621][ T1884]  ? fsnotify_perm.part.0+0x268/0x630
[  448.381038][ T1884]  do_dentry_open+0x88b/0x1730
[  448.385831][ T1884]  ? __unregister_chrdev+0x100/0x100
[  448.391132][ T1884]  ? may_open+0x1f2/0x400
[  448.395486][ T1884]  path_openat+0x19af/0x29c0
[  448.400102][ T1884]  ? path_lookupat+0x770/0x770
[  448.404892][ T1884]  do_filp_open+0x1de/0x430
[  448.409404][ T1884]  ? may_open_dev+0xf0/0xf0
[  448.413913][ T1884]  ? expand_files+0x442/0x910
[  448.418606][ T1884]  ? _raw_spin_unlock+0x28/0x40
[  448.423476][ T1884]  ? alloc_fd+0x2da/0x6c0
[  448.427819][ T1884]  do_sys_openat2+0x176/0x1e0
[  448.432508][ T1884]  ? build_open_flags+0x690/0x690
[  448.437548][ T1884]  __x64_sys_openat+0x175/0x210
[  448.442411][ T1884]  ? __ia32_sys_open+0x1e0/0x1e0
[  448.447361][ T1884]  ? ksys_write+0x1a7/0x250
[  448.451878][ T1884]  ? rcu_is_watching+0x12/0xb0
[  448.456671][ T1884]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  448.462673][ T1884]  do_syscall_64+0x38/0xb0
[  448.467102][ T1884]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  448.473016][ T1884] RIP: 0033:0x7f894267cae9
[  448.477435][ T1884] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  448.497061][ T1884] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  448.505491][ T1884] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  448.513468][ T1884] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  448.521452][ T1884] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  448.529439][ T1884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  448.537416][ T1884] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  448.545398][ T1884]  </TASK>
[  448.553362][ T1889] FAULT_INJECTION: forcing a failure.
[  448.553362][ T1889] name failslab, interval 1, probability 0, space 0, times 0
[  448.576113][ T1889] CPU: 0 PID: 1889 Comm: syz-executor.4 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  448.586475][ T1889] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  448.596530][ T1889] Call Trace:
[  448.599808][ T1889]  <TASK>
[  448.602738][ T1889]  dump_stack_lvl+0x125/0x1b0
[  448.607440][ T1889]  should_fail_ex+0x496/0x5b0
[  448.612126][ T1889]  should_failslab+0x9/0x20
[  448.616641][ T1889]  __kmem_cache_alloc_node+0x5f/0x470
[  448.622024][ T1889]  ? tomoyo_encode2+0x100/0x3d0
[  448.626886][ T1889]  __kmalloc+0x4f/0x100
[  448.631061][ T1889]  tomoyo_encode2+0x100/0x3d0
[  448.635750][ T1889]  ? rcu_is_watching+0x12/0xb0
[  448.640520][ T1889]  tomoyo_encode+0x29/0x50
[  448.644946][ T1889]  tomoyo_realpath_from_path+0x196/0x710
[  448.650591][ T1889]  tomoyo_check_open_permission+0x2aa/0x3b0
[  448.656495][ T1889]  ? tomoyo_path_number_perm+0x590/0x590
[  448.662138][ T1889]  ? rcu_is_watching+0x12/0xb0
[  448.666912][ T1889]  ? lock_release+0x4bf/0x680
[  448.671602][ T1889]  ? selinux_inode_permission+0xe2/0x5f0
[  448.677253][ T1889]  ? hook_path_mknod+0x670/0x670
[  448.682207][ T1889]  ? reacquire_held_locks+0x4b0/0x4b0
[  448.687598][ T1889]  ? spin_bug+0x1d0/0x1d0
[  448.691947][ T1889]  ? make_vfsgid+0x108/0x160
[  448.696550][ T1889]  tomoyo_file_open+0xa8/0xd0
[  448.701332][ T1889]  security_file_open+0x6a/0xe0
[  448.706201][ T1889]  do_dentry_open+0x538/0x1730
[  448.710977][ T1889]  ? may_open+0x1f2/0x400
[  448.715330][ T1889]  path_openat+0x19af/0x29c0
[  448.719953][ T1889]  ? path_lookupat+0x770/0x770
[  448.724745][ T1889]  do_filp_open+0x1de/0x430
[  448.729254][ T1889]  ? may_open_dev+0xf0/0xf0
[  448.733767][ T1889]  ? expand_files+0x442/0x910
[  448.738463][ T1889]  ? _raw_spin_unlock+0x28/0x40
[  448.743335][ T1889]  ? alloc_fd+0x2da/0x6c0
[  448.747679][ T1889]  do_sys_openat2+0x176/0x1e0
[  448.752369][ T1889]  ? build_open_flags+0x690/0x690
[  448.757411][ T1889]  __x64_sys_openat+0x175/0x210
[  448.762277][ T1889]  ? __ia32_sys_open+0x1e0/0x1e0
[  448.767227][ T1889]  ? ksys_write+0x1a7/0x250
[  448.771747][ T1889]  ? rcu_is_watching+0x12/0xb0
[  448.776518][ T1889]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  448.782509][ T1889]  do_syscall_64+0x38/0xb0
[  448.786936][ T1889]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  448.792842][ T1889] RIP: 0033:0x7fc16a87cae9
[  448.797263][ T1889] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  448.816876][ T1889] RSP: 002b:00007fc16b6140c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  448.825296][ T1889] RAX: ffffffffffffffda RBX: 00007fc16a99bf80 RCX: 00007fc16a87cae9
[  448.833274][ T1889] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  448.841247][ T1889] RBP: 00007fc16b614120 R08: 0000000000000000 R09: 0000000000000000
[  448.849223][ T1889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  448.857202][ T1889] R13: 000000000000000b R14: 00007fc16a99bf80 R15: 00007ffec7baa168
[  448.865191][ T1889]  </TASK>
14:13:46 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 10)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:46 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})

[  448.948383][ T1889] ERROR: Out of memory at tomoyo_realpath_from_path.
14:13:46 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r4, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)

14:13:46 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r4 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r4, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:47 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:47 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, 0x0)
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:47 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)

14:13:47 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:47 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
r6 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)
ioctl$SECCOMP_IOCTL_NOTIF_SEND(r6, 0xc0182101, &(0x7f00000009c0)={0x0, 0xb6d, 0x5})

[  449.079756][ T1889] workqueue: Failed to create a rescuer kthread for wq "nfc3_nci_tx_wq": -EINTR
[  449.316926][ T1916] FAULT_INJECTION: forcing a failure.
[  449.316926][ T1916] name failslab, interval 1, probability 0, space 0, times 0
[  449.352202][ T1916] CPU: 1 PID: 1916 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  449.362572][ T1916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  449.372641][ T1916] Call Trace:
[  449.375924][ T1916]  <TASK>
[  449.378853][ T1916]  dump_stack_lvl+0x125/0x1b0
[  449.383557][ T1916]  should_fail_ex+0x496/0x5b0
[  449.388242][ T1916]  should_failslab+0x9/0x20
[  449.392757][ T1916]  __kmem_cache_alloc_node+0x5f/0x470
[  449.398139][ T1916]  kmalloc_trace+0x25/0xe0
[  449.402571][ T1916]  nci_allocate_device+0x105/0x430
[  449.407701][ T1916]  virtual_ncidev_open+0x6f/0x220
[  449.412749][ T1916]  ? virtual_ncidev_read+0x4e0/0x4e0
[  449.418039][ T1916]  misc_open+0x3da/0x4c0
[  449.422293][ T1916]  ? misc_devnode+0x120/0x120
[  449.426980][ T1916]  chrdev_open+0x277/0x700
[  449.431403][ T1916]  ? __unregister_chrdev+0x100/0x100
[  449.436691][ T1916]  ? fsnotify_perm.part.0+0x25d/0x630
[  449.442082][ T1916]  ? fsnotify_perm.part.0+0x268/0x630
[  449.447479][ T1916]  do_dentry_open+0x88b/0x1730
[  449.452255][ T1916]  ? __unregister_chrdev+0x100/0x100
[  449.457551][ T1916]  ? may_open+0x1f2/0x400
[  449.461899][ T1916]  path_openat+0x19af/0x29c0
[  449.466532][ T1916]  ? path_lookupat+0x770/0x770
[  449.471329][ T1916]  do_filp_open+0x1de/0x430
[  449.475838][ T1916]  ? may_open_dev+0xf0/0xf0
[  449.480346][ T1916]  ? expand_files+0x442/0x910
[  449.485044][ T1916]  ? _raw_spin_unlock+0x28/0x40
[  449.489914][ T1916]  ? alloc_fd+0x2da/0x6c0
[  449.494257][ T1916]  do_sys_openat2+0x176/0x1e0
[  449.498943][ T1916]  ? build_open_flags+0x690/0x690
[  449.503979][ T1916]  __x64_sys_openat+0x175/0x210
[  449.508839][ T1916]  ? __ia32_sys_open+0x1e0/0x1e0
[  449.513785][ T1916]  ? ksys_write+0x1a7/0x250
[  449.518300][ T1916]  ? rcu_is_watching+0x12/0xb0
[  449.523070][ T1916]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  449.529061][ T1916]  do_syscall_64+0x38/0xb0
[  449.533484][ T1916]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  449.539385][ T1916] RIP: 0033:0x7f894267cae9
[  449.543803][ T1916] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  449.563417][ T1916] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  449.571839][ T1916] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  449.579820][ T1916] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  449.587797][ T1916] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  449.595771][ T1916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  449.603746][ T1916] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  449.611723][ T1916]  </TASK>
14:13:47 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:47 executing program 1:
syz_open_dev$vcsu(0x0, 0x0, 0x0)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x0)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (fail_nth: 11)
syz_open_dev$vcsn(0x0, 0x0, 0x0)
ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x0)
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0)
openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0)
syz_open_dev$vcsu(0x0, 0x0, 0x8300)
ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f00000008c0))

14:13:47 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)

14:13:47 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)

14:13:47 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, 0x0)
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

14:13:47 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x3, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:47 executing program 2:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
r4 = syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
r5 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000700), 0x2, 0x0)
ioctl$VHOST_VDPA_GET_CONFIG(r5, 0x8008af73, &(0x7f0000000740)={0x0, 0xe3, ""/227})
sendmsg$L2TP_CMD_SESSION_GET(r4, &(0x7f0000000900)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000880)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfd, {}, [@L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x81}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44}, 0x8000)
setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f0000000940)={@local, @private=0xa010100, 0x0, "83439713d2bf742ffc9a71f87e3dc5c8d08d556af41e92051183fe6200a8c54b", 0x2, 0x101, 0x0, 0x1}, 0x3c)

14:13:47 executing program 5:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
sendmsg$L2TP_CMD_TUNNEL_DELETE(r2, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, r1, 0x100, 0xa2, 0x25dfdbfd, {}, [@L2TP_ATTR_ENCAP_TYPE={0x6, 0x2, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x80)
syz_genetlink_get_family_id$l2tp(&(0x7f0000000a40), r0)

14:13:47 executing program 0:
r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x302080, 0x0)
r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000080), 0xffffffffffffffff)
sendmsg$L2TP_CMD_NOOP(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x30772dfbc4f6c3a9}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, r1, 0x800, 0x70bd2d, 0x25dfdbfe, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_FD={0x8}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000)
r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000180), 0x12280, 0x0)
sendmsg$L2TP_CMD_NOOP(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x58, r1, 0x20, 0x70bd28, 0x25dfdbfb, {}, [@L2TP_ATTR_OFFSET={0x6, 0x3, 0x3}, @L2TP_ATTR_COOKIE={0xc, 0xf, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x1}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x58}, 0x1, 0x0, 0x0, 0x40040c0}, 0x800)
r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x105100, 0x0)
sendmsg$L2TP_CMD_TUNNEL_CREATE(r2, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x400, 0x70bd26, 0x25dfdbfe, {}, [@L2TP_ATTR_VLAN_ID={0x6, 0xe, 0x8}, @L2TP_ATTR_LNS_MODE={0x5, 0x14, 0x7}, @L2TP_ATTR_FD={0x8, 0x17, @l2tp6=r3}, @L2TP_ATTR_IP6_SADDR={0x14, 0x1f, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @L2TP_ATTR_RECV_TIMEOUT={0xc, 0x16, 0x3b}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40084800}, 0x4084)
sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x4c, r1, 0x400, 0x70bd29, 0x25dfdbff, {}, [@L2TP_ATTR_IFNAME={0x14, 0x8, 'veth1_macvtap\x00'}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_MRU={0x6, 0x1d, 0x1a}, @L2TP_ATTR_PEER_COOKIE={0xc, 0x10, 0x20}, @L2TP_ATTR_DEBUG={0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x10)
syz_open_dev$vcsn(&(0x7f00000005c0), 0xfffffffffffff6b6, 0x2)
openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000980), 0x410000, 0x0)

[  450.031419][ T1959] FAULT_INJECTION: forcing a failure.
[  450.031419][ T1959] name failslab, interval 1, probability 0, space 0, times 0
14:13:47 executing program 4:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x4, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x0, 0x8, {0x0, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r7=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, 0x0, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(r4, 0x40045566, 0x3)

14:13:47 executing program 3:
r0 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000000), 0x400400, 0xb)
setsockopt$RDS_CANCEL_SENT_TO(r0, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e23, @remote}, 0x10)
r1 = syz_open_dev$vcsu(&(0x7f0000000080), 0x3, 0x14000)
ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0x6)
openat$nci(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
fstat(r1, &(0x7f0000000100))
r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x4, 0x40000)
ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x14)
r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0)
fstat(r3, &(0x7f0000000200))
sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000540)={&(0x7f00000002c0)={0x24c, 0x14, 0x400, 0x70bd28, 0x25dfdbff, {0x29, 0x6f}, [@INET_DIAG_REQ_BYTECODE={0xa1, 0x1, "8aa791beee2d83626182fbb182ce7b034d4793a3389f84e15419325d62b12002db48c2cbf1c46dd2234b7b3de8cbaa1bb289647a8e7f54c53532fa577b56f03f8d259f6cf547426c84c480670c17b309bb6276443e8f2d55ea983178f48c8b672f08756dcfacfdec09fbbdb11840d1a7f1440f8da8d17a02d5dbdd2bbd53cad5addfb3630f666e9265435b30e6016214e7c7ae277194c8d3ebd777b876"}, @INET_DIAG_REQ_BYTECODE={0x70, 0x1, "92d1eca6ec9bb35835cf88ddb6512130616807796faa353a7d3541115cd7dfba353c6c9f407ffc59e3601522f0070a131014362aef25b95405f8f4d218bbd4da4d8a16388491dde20b59e35b88ca90e072b24b4f93980f6055e9f9d63805bdd595bac56ad8f21f64ad9997af"}, @INET_DIAG_REQ_BYTECODE={0x14, 0x1, "51002315e37835ab49f9825eda2cd5f7"}, @INET_DIAG_REQ_BYTECODE={0x63, 0x1, "e8d40a8be25a43dca80bac289eeb5563e11019ee0d78d99ce2c037a2aff3b033015b18ce03ca5f3d783babc58971be99c71776e0fcc9c35ae65ba3658d6ba8ada4eabfb9ad23a50e2c91b8b07b5928c905b79be1d197dd9647e8be76d0803c"}, @INET_DIAG_REQ_BYTECODE={0xac, 0x1, "a462f97cc4ddb23c2fa99231832d0932663bc417f9c5130890c9e24c6500921a74463a90437701d19e08f192f9f7ec0e66a2ca068c03a39db4723411609581d9cc4fc8b91bf840ede172565f1c419523af69297f9983b608e63f447e972621ee3491c5f65394e7f31dc5fb7f1c6b4b77e16d74741b5ac29978f207f0df589e56576972e2b31bceffcb3724311a69f8b34c7b183a7845cd269672f8034d1a75a3f373974b82564018"}]}, 0x24c}, 0x1, 0x0, 0x0, 0x40}, 0x44000)
r4 = openat$bsg(0xffffffffffffff9c, &(0x7f00000005c0), 0x40, 0x0)
ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x6)
r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000600), 0x2, 0x0)
write$vhost_msg_v2(r5, &(0x7f00000006c0)={0x2, 0x0, {&(0x7f0000000640)=""/5, 0x5, &(0x7f0000000680)=""/11, 0x2, 0x4}}, 0x48)
r6 = syz_open_dev$vcsu(&(0x7f0000000740), 0xfff, 0x8300)
ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000780)={0xb, 0x6, {0xdef62cdc2687b97d, 0x5, 0x8, {0x1, 0xa4}, {0xed1, 0x2}, @rumble={0x4, 0x8001}}, {0x54, 0x3f, 0xe39, {0x8, 0xd9ec}, {0x3d2, 0x5}, @rumble={0x4, 0x7}}})
ioctl$UI_GET_SYSNAME(r4, 0x8040552c, &(0x7f0000000800))
r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000880), 0xffffffffffffffff)
ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000008c0)=<r8=>0x0)
sendmsg$NFC_CMD_DEP_LINK_UP(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000840)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000980)={&(0x7f0000000900)={0x44, r7, 0x100, 0x70bd27, 0x25dfdbfe, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x1}, @NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}, @NFC_ATTR_TARGET_INDEX={0x8, 0x4, 0xffffffffffffffff}, @NFC_ATTR_COMM_MODE={0x5, 0xa, 0x25cb3ed30f2295dd}]}, 0x44}, 0x1, 0x0, 0x0, 0x4820}, 0x40000)
ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r2, 0x40082102, &(0x7f0000000a00))
ioctl$UI_SET_RELBIT(0xffffffffffffffff, 0x40045566, 0x3)
openat$ipvs(0xffffffffffffff9c, &(0x7f0000000a80)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0)
setsockopt$MRT_DEL_MFC(r2, 0x0, 0xcd, &(0x7f0000000ac0)={@initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0xffffffffffffffff, "f408874063175be01f317edf04c4d0d1b3ca81c5fdcbbba78f3f3cc0528337c6", 0x5, 0x3, 0x7f, 0x2}, 0x3c)

[  450.125311][ T1959] CPU: 0 PID: 1959 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  450.135684][ T1959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  450.145761][ T1959] Call Trace:
[  450.149063][ T1959]  <TASK>
[  450.152011][ T1959]  dump_stack_lvl+0x125/0x1b0
[  450.156739][ T1959]  should_fail_ex+0x496/0x5b0
[  450.161455][ T1959]  ? kvasprintf_const+0x66/0x190
[  450.166463][ T1959]  ? kvasprintf_const+0x66/0x190
[  450.171472][ T1959]  should_failslab+0x9/0x20
[  450.176019][ T1959]  __kmem_cache_alloc_node+0x5f/0x470
[  450.181434][ T1959]  ? pointer+0xbf0/0xbf0
[  450.185746][ T1959]  ? kvasprintf_const+0x66/0x190
[  450.190723][ T1959]  __kmalloc_node_track_caller+0x50/0x100
[  450.196491][ T1959]  kvasprintf+0xbd/0x150
[  450.200779][ T1959]  ? bust_spinlocks+0xe0/0xe0
[  450.205494][ T1959]  ? rcu_is_watching+0x12/0xb0
[  450.210276][ T1959]  kvasprintf_const+0x66/0x190
[  450.215073][ T1959]  kobject_set_name_vargs+0x5a/0x130
[  450.220396][ T1959]  dev_set_name+0xc8/0x100
[  450.224952][ T1959]  ? device_initialize+0x510/0x510
[  450.230116][ T1959]  nfc_allocate_device+0x206/0x5e0
[  450.235331][ T1959]  nci_allocate_device+0x23b/0x430
[  450.240484][ T1959]  virtual_ncidev_open+0x6f/0x220
[  450.245536][ T1959]  ? virtual_ncidev_read+0x4e0/0x4e0
[  450.250844][ T1959]  misc_open+0x3da/0x4c0
[  450.255137][ T1959]  ? misc_devnode+0x120/0x120
[  450.259855][ T1959]  chrdev_open+0x277/0x700
[  450.264297][ T1959]  ? __unregister_chrdev+0x100/0x100
[  450.269607][ T1959]  ? fsnotify_perm.part.0+0x25d/0x630
[  450.275012][ T1959]  ? fsnotify_perm.part.0+0x268/0x630
[  450.280429][ T1959]  do_dentry_open+0x88b/0x1730
[  450.285230][ T1959]  ? __unregister_chrdev+0x100/0x100
[  450.290548][ T1959]  ? may_open+0x1f2/0x400
[  450.294929][ T1959]  path_openat+0x19af/0x29c0
[  450.299579][ T1959]  ? path_lookupat+0x770/0x770
[  450.304391][ T1959]  do_filp_open+0x1de/0x430
[  450.308917][ T1959]  ? may_open_dev+0xf0/0xf0
[  450.313447][ T1959]  ? expand_files+0x442/0x910
[  450.318165][ T1959]  ? _raw_spin_unlock+0x28/0x40
[  450.323058][ T1959]  ? alloc_fd+0x2da/0x6c0
[  450.327425][ T1959]  do_sys_openat2+0x176/0x1e0
[  450.332136][ T1959]  ? build_open_flags+0x690/0x690
[  450.337189][ T1959]  __x64_sys_openat+0x175/0x210
[  450.342079][ T1959]  ? __ia32_sys_open+0x1e0/0x1e0
[  450.347045][ T1959]  ? ksys_write+0x1a7/0x250
[  450.351578][ T1959]  ? rcu_is_watching+0x12/0xb0
[  450.356371][ T1959]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  450.362389][ T1959]  do_syscall_64+0x38/0xb0
[  450.366838][ T1959]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  450.372771][ T1959] RIP: 0033:0x7f894267cae9
[  450.377209][ T1959] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  450.396842][ T1959] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  450.405289][ T1959] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  450.413288][ T1959] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  450.421289][ T1959] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  450.429283][ T1959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  450.437276][ T1959] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  450.445278][ T1959]  </TASK>
[  450.548497][ T1959] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN
[  450.560264][ T1959] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[  450.568691][ T1959] CPU: 1 PID: 1959 Comm: syz-executor.1 Not tainted 6.6.0-rc1-syzkaller-00115-g9fdfb15a3dbf #0
[  450.579041][ T1959] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
[  450.589112][ T1959] RIP: 0010:strchr+0x1b/0xb0
[  450.593742][ T1959] Code: 9e ab f7 48 8b 74 24 08 48 8b 14 24 eb 89 90 f3 0f 1e fa 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 83 ec 10 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 51 0f b6 07 89
[  450.613376][ T1959] RSP: 0018:ffffc90004b0f630 EFLAGS: 00010286
[  450.619466][ T1959] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009fb1000
[  450.627455][ T1959] RDX: 0000000000000000 RSI: 0000000000000025 RDI: 0000000000000000
[  450.635440][ T1959] RBP: ffffc90004b0f6c0 R08: 0000000000000001 R09: 0000000000000000
[  450.643429][ T1959] R10: 0000000000000001 R11: 0000000000000000 R12: ffffc90004b0f6c0
[  450.651422][ T1959] R13: 0000000000000cc0 R14: ffff888141375c80 R15: 0000000000000001
[  450.659417][ T1959] FS:  00007f89433956c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
[  450.668381][ T1959] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  450.674996][ T1959] CR2: 00007fc16b56fd58 CR3: 000000002b3cb000 CR4: 00000000003506e0
[  450.682996][ T1959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  450.690992][ T1959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  450.698985][ T1959] Call Trace:
[  450.702279][ T1959]  <TASK>
[  450.705225][ T1959]  ? show_regs+0x8f/0xa0
[  450.709531][ T1959]  ? die_addr+0x4f/0xd0
[  450.713733][ T1959]  ? exc_general_protection+0x154/0x230
[  450.719323][ T1959]  ? asm_exc_general_protection+0x26/0x30
[  450.725080][ T1959]  ? strchr+0x1b/0xb0
[  450.729086][ T1959]  ? __mutex_unlock_slowpath+0x165/0x640
[  450.734748][ T1959]  kvasprintf_const+0x25/0x190
[  450.739551][ T1959]  kobject_set_name_vargs+0x5a/0x130
[  450.744872][ T1959]  kobject_add+0x12a/0x240
[  450.749329][ T1959]  ? kset_create_and_add+0x190/0x190
[  450.754657][ T1959]  ? do_raw_spin_unlock+0x173/0x230
[  450.759905][ T1959]  ? kobject_put+0xbe/0x440
[  450.764445][ T1959]  device_add+0x290/0x1ac0
[  450.768920][ T1959]  ? reacquire_held_locks+0x4b0/0x4b0
[  450.774332][ T1959]  ? __fw_devlink_link_to_consumers.isra.0+0x270/0x270
[  450.781219][ T1959]  ? lockdep_init_map_type+0x16d/0x7c0
[  450.786724][ T1959]  nfc_register_device+0x41/0x3c0
[  450.791802][ T1959]  nci_register_device+0x7f4/0xb80
[  450.796958][ T1959]  ? nci_init_complete_req+0x410/0x410
[  450.802462][ T1959]  ? lockdep_init_map_type+0x16d/0x7c0
[  450.807972][ T1959]  virtual_ncidev_open+0x147/0x220
[  450.813122][ T1959]  ? virtual_ncidev_read+0x4e0/0x4e0
[  450.818447][ T1959]  misc_open+0x3da/0x4c0
[  450.822732][ T1959]  ? misc_devnode+0x120/0x120
[  450.827450][ T1959]  chrdev_open+0x277/0x700
[  450.831895][ T1959]  ? __unregister_chrdev+0x100/0x100
[  450.837203][ T1959]  ? fsnotify_perm.part.0+0x25d/0x630
[  450.842614][ T1959]  ? fsnotify_perm.part.0+0x268/0x630
[  450.848021][ T1959]  do_dentry_open+0x88b/0x1730
[  450.852804][ T1959]  ? __unregister_chrdev+0x100/0x100
[  450.858120][ T1959]  ? may_open+0x1f2/0x400
[  450.862496][ T1959]  path_openat+0x19af/0x29c0
[  450.867145][ T1959]  ? path_lookupat+0x770/0x770
[  450.871957][ T1959]  do_filp_open+0x1de/0x430
[  450.876492][ T1959]  ? may_open_dev+0xf0/0xf0
[  450.881022][ T1959]  ? expand_files+0x442/0x910
[  450.885741][ T1959]  ? _raw_spin_unlock+0x28/0x40
[  450.890632][ T1959]  ? alloc_fd+0x2da/0x6c0
[  450.894989][ T1959]  do_sys_openat2+0x176/0x1e0
[  450.899698][ T1959]  ? build_open_flags+0x690/0x690
[  450.904761][ T1959]  __x64_sys_openat+0x175/0x210
[  450.909646][ T1959]  ? __ia32_sys_open+0x1e0/0x1e0
[  450.914620][ T1959]  ? ksys_write+0x1a7/0x250
[  450.919167][ T1959]  ? rcu_is_watching+0x12/0xb0
[  450.923967][ T1959]  ? trace_irq_enable.constprop.0+0xd0/0x100
[  450.929982][ T1959]  do_syscall_64+0x38/0xb0
[  450.934434][ T1959]  entry_SYSCALL_64_after_hwframe+0x63/0xcd
[  450.940365][ T1959] RIP: 0033:0x7f894267cae9
[  450.944800][ T1959] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
[  450.964440][ T1959] RSP: 002b:00007f89433950c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[  450.972878][ T1959] RAX: ffffffffffffffda RBX: 00007f894279bf80 RCX: 00007f894267cae9
[  450.980873][ T1959] RDX: 0000000000000002 RSI: 00000000200000c0 RDI: ffffffffffffff9c
[  450.988870][ T1959] RBP: 00007f8943395120 R08: 0000000000000000 R09: 0000000000000000
[  450.996859][ T1959] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002
[  451.004850][ T1959] R13: 000000000000000b R14: 00007f894279bf80 R15: 00007ffe42508c28
[  451.012853][ T1959]  </TASK>
[  451.015888][ T1959] Modules linked in:
[  451.085913][ T1959] ---[ end trace 0000000000000000 ]---
[  451.133626][ T1959] RIP: 0010:strchr+0x1b/0xb0
[  451.138411][ T1959] Code: 9e ab f7 48 8b 74 24 08 48 8b 14 24 eb 89 90 f3 0f 1e fa 48 b8 00 00 00 00 00 fc ff df 48 89 fa 55 48 c1 ea 03 53 48 83 ec 10 <0f> b6 04 02 48 89 fa 83 e2 07 38 d0 7f 04 84 c0 75 51 0f b6 07 89
[  451.159095][ T1959] RSP: 0018:ffffc90004b0f630 EFLAGS: 00010286
[  451.165639][ T1959] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90009fb1000
[  451.173858][ T1959] RDX: 0000000000000000 RSI: 0000000000000025 RDI: 0000000000000000
[  451.178129][   T27] audit: type=1400 audit(1694787229.024:139): avc:  denied  { rename } for  pid=4467 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  451.181842][ T1959] RBP: ffffc90004b0f6c0 R08: 0000000000000001 R09: 0000000000000000
[  451.181862][ T1959] R10: 0000000000000001 R11: 0000000000000000 R12: ffffc90004b0f6c0
[  451.181880][ T1959] R13: 0000000000000cc0 R14: ffff888141375c80 R15: 0000000000000001
[  451.181900][ T1959] FS:  00007f89433956c0(0000) GS:ffff8880b9900000(0000) knlGS:0000000000000000
[  451.250640][   T27] audit: type=1400 audit(1694787229.024:140): avc:  denied  { unlink } for  pid=4467 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  451.268918][ T1959] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  451.301732][   T27] audit: type=1400 audit(1694787229.024:141): avc:  denied  { create } for  pid=4467 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  451.404121][ T1959] CR2: 00007fc16b56fd58 CR3: 000000002b3cb000 CR4: 00000000003506e0
[  451.444893][ T1959] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[  451.470146][ T1959] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[  451.478514][ T1959] Kernel panic - not syncing: Fatal exception
[  451.484779][ T1959] Kernel Offset: disabled
[  451.489091][ T1959] Rebooting in 86400 seconds..